Security - Red Teaming / White Box Testing / C2
Remote if in: IL, TX, FL, GA, MA, MD, MN, NC, NJ, NY, DC, WI or in office (hybrid) Chicago, IL / Dallas, TX
NO SPONSORSHIP
Security Red Team White Box Tester
Rate: Open
The role will continue passed the end of the year. It will be renewed
They have C2s and CVEs on their resumes.
The preference is if they do reverse engineering.
Heavy web penetration testing
coding languages like Python, C++, and C#.
Able to perform an exploit, found a bug that nobody found and reports it to the vendor
certs would be important like hack the box, bug bounty, ocsp, gxpn, etc.
heavy manual testing
malware development, etc.
The more they have on their resume that I just highlighted, the better
like minimum 3-8 years of experience, not people with 20 years of experience.
- 5+ Plus years penetration testing knowledge how to build command and control c2 infrastructure network/operating system application web mobile social engineering emissions signals white box penetration testing this is a hands-on hacker that can hack anything enterprise wide.
- Help plan, design and execute security red team related activities (e.g., Intelligence Gathering, Network/Operating System/Application Penetration Testing, Web Application Penetration Testing, Mobile Application Testing, Social Engineering, Basic Emissions/Signals Testing, Physical Security Testing, Command and Control (C2) Infrastructure Development, Cyber Defense Evasion “Stealth” techniques, etc.)
- Assist with ad-hoc white-box penetration testing work of OCC’s infrastructure that is still currently in Development, or in need of pre-Production penetration testing
- interact with multiple teams such as Cyber Defense, Security Assurance, and various other Security and IT teams to coordinate penetration testing engagements and re-test remediated Red Team findings.
- Produce reports and present findings to various levels of leadership and staff relating to security testing activities, as needed
- Perform security risk assessment, threat analysis and threat modeling.
II. SKILL AND EXPERIENCE REQUIRED:
- Desired:
- Strong proficiency in Network, Web Application, and Mobile Device security testing
- Demonstrated exploit, payload, and attack framework development experience
- Strong knowledge of EDR detection capabilities such as Crowdstrike/Carbon Black, etc. and associated defense evasion techniques for behavioral based alerting
- Strong proficiency in social engineering and intelligence gathering.
- Strong experience with custom scripting (Python, Powershell, Bash, etc.) and process automation.
- Knowledge how to build Command and Control (C2) infrastructure and execute Cyber Defense Evasion techniques to help enhance Cyber Defense monitoring/alerting capabilities for C2 traffic specifically
- Strong understanding of security vulnerabilities and develop relevant exploits/payloads for use during Red Team activities
- Strong experience with database security testing (MSSQL, DB2, MySQL, etc.).
- Strong proficiency with common penetration testing tools (Kali, Armitage, Metasploit, Cobalt Strike, Nighthawk, Nmap, Qualys, Nessus, Burp Suite, Wireshark, Recon-NG, Ettercap/Bettercap, Hashcat, Bloodhound, Ida Pro, Ghidra, Sublist3r, Rubeus, Mimikatz, CrackMapExec, Exploitdb, Yersinia, Impacket, etc.).
- Track record of vulnerability research and CVE assignments
- Knowledge of Windows APIs and Living off the Land (LOL) Binaries
- Experience with Mainframes, Windows, Unix, MacOS, Cisco, platforms and controls.
- Education and/or Experience:
- BS in Computer Science, Information Management, Information Security or other comparable technical degree from an accredited college/university desired.
- 3+ Years’ experience of Penetration testing
- 5+ Years’ experience in Information Assurance or Information Security environment.
- Certifications:
- [Preferred] Professional security certifications a plus (OSCP, OSWE, GXPN, GMOB, GWAPT, etc.)
Apply Job!
Apply to this Job