Ahmedabad, Gujarat, India
1 day ago
Assistant Manager - Red Teaming

Red Teaming Engagements: Assist in executing red teaming engagements to simulate real-world attack scenarios and identify vulnerabilities in various environments. 

Threat Simulation & Attack Path Mapping: Support the development and refinement of threat emulation plans and model attack paths from an adversary’s perspective to test the resilience of existing security measures. 

Collaborative Defense: Work closely with Blue Teams, incident response teams, and the Security Operations Center (SOC) to enhance detection, response times, and mitigation strategies. 

Vulnerability Research: Conduct research on emerging cybersecurity threats and assist in developing proof-of-concept exploits to demonstrate the impact of vulnerabilities. 

Reporting: Help produce technical reports detailing vulnerabilities, successful attack simulations, and recommendations for improvement. 

Training and Knowledge Sharing: Participate in mentorship and training sessions to develop skills in red teaming methodologies and cybersecurity best practices. 

Tool Development: Assist in developing, customizing, or extending red teaming tools, scripts, and automation frameworks to simulate various attack vectors. 

Education: Bachelor’s degree in computer science, cybersecurity, information security, or a related technical field. 

Technical Skills: Basic knowledge of offensive security tools (e.g., Metasploit, Burp Suite), understanding of network protocols, firewalls, intrusion detection systems, and secure configurations. Familiarity with various operating systems (Windows, Linux) and cloud environments (AWS, Azure) is a plus. 

Soft Skills: Excellent written and verbal communication skills, strong problem-solving abilities, effective collaboration skills, and a commitment to ethical hacking principles. 

Continuous Learning: Dedication to staying ahead of cybersecurity threats through ongoing research and professional development. 

Adversarial Mindset: Ability to think like an adversary and develop innovative ways to bypass security controls. 

Confirmar seu email: Enviar Email