Skip to main content

This job has expired

Red Team - Lead Engineer

Employer
Target
Location
Brooklyn Park, Minnesota
Start date
May 23, 2019
Closing date
Jun 26, 2019

View more

Category
Retail / Wholesale
Employment Status
Full Time
Description:
The Target Red Team provides the Cyber Fusion Center with a
realistic depiction of threat actor behaviors and scenarios during simulated
exercises. We drive improvements to detection and response capabilities through
regular testing of security controls across the enterprise.

In this position, you will use your skills, experience, and
talents as a member of a world-class cyber security team. As a Lead Engineer on the Red Team, you
will...
  • Lead the design and execution of adversary
    simulation scenarios
  • Partner with the detection and incident response
    teams to identify improvement opportunities
  • Conduct research into real-world threat actor
    tactics, techniques, and procedures to perform security tests
  • Mentor and teach junior team members to help
    build offensive security skills
  • Bypass preventative and detective security
    controls to accomplish scenario goals
  • Plan out compromise scenarios in an enterprise
    environment to help build better defensive capabilities
  • Utilize Agile methodology for development and
    issue tracking
  • Work with cross functional teams to develop
    remediation strategies based on scenario outcomes
  • Report observations using a standardized
    reporting structure
  • Work with third parties to manage and coordinate
    scenario tests


Requirements:
  • 5+ years of experience performing security
    testing and/or red teaming
  • BA or BS degree in Information Security, Cyber
    Security, Computer Science or related field (OR 9+ years of relevant experience
    required in lieu of a degree).
  • Extensive background in offensive security across
    multiple domains including at least 3 of the following: enterprise
    applications, web applications, mobile applications, databases, point of sale
    applications and infrastructure, retail store applications and infrastructure,
    mobile devices, network and cloud infrastructure, server, mainframe, and
    directory services
  • Experience developing new software and hardware
    tools for use in exploitation scenarios
  • Subject-matter expert on attacker/hacker
    methodology
  • Demonstrated experience exploiting
    vulnerabilities in an authorized manner
  • Excellent oral and written communication skills
  • Excellent scripting and programing skills in
    multiple languages (Python, PowerShell, C#, Assembly languages)


Desired Skills:
  • One or more penetration testing certifications
    (OSCP, OSCE, GPEN, GXPN, GWAPT, etc.)
  • Experience with software or hardware reverse
    engineering
  • Experience using Vulnerability Identification
    and Management tools


Qualifications:

Get job alerts

Create a job alert and receive personalized job recommendations straight to your inbox.

Create alert