Sr. Specialist, Threat Emulation

We are is seeking a Senior Specialist, for our Threat Emulation Services team, to deliver the firm’s service offerings around system-wide views of threat-driven risks and applying them to the testing of systems and services that the firm delivers.

Required Experience:


+ Years
Job Locations:


Location Restrictions:


Basic Qualifications and

The successful candidate will have a proven track record of leading and executing penetration tests, performing threat/adversary emulation within a passionate offensive security team and executing tactical, offensive assessments.

  • Perform scoped and open-ended assessments on internal and external facing systems.
  • Perform threat and vulnerability research to identify new ways of achieving the program’s mission and act as a source for innovation within the cybersecurity     industry.
  • Assisting in the sales process with potential or existing clients, and acting as a client’s primary program contact for projects delivered by our Threat Emulation     team
  • Develop and implement tools that assist with execution of security assessments, including custom tools and automation.
  • Work with the customer Blue Team to identify gaps, address findings, and improve breach response.

Required Skills and Experience
  • At least 4 years of progressively responsible experience performing network and application security assessments and Cyber Red Team operations
  • Executing application and/or network penetration tests  
  • Executing Red Team or Threat Emulation assessments
  • Work collaboratively with a variety of internal and external stakeholders (security consultants, project managers, service managers, development teams,     technical SME’s, vendors) to deliver high quality assessments.
  • Understanding of and experience with:
  • Networking fundamentals (all OSI layers, protocols, etc.)  
  • Windows/Linux/Unix operating systems
  • Operating system and software vulnerabilities and exploitation techniques
  • Web and mobile application vulnerabilities and exploitation techniques
  • Malware packing, obfuscation, persistence, exfiltration techniques
  • Security technologies such as Firewalls, IDS/IPS, Web Proxies and DLP amongst others
  • Commercial or open-source offensive security tools for reconnaissance, scanning, exploitation and post-exploitation (e.g. Nmap, Nessus, Metasploit, Burp Suite, etc.)
  • Project Management
  • Demonstrated team-oriented interpersonal skills, with the ability to interface effectively upper management, IT leadership and technology vendors.
  • Ability to collaborate and build positive relationships across multiple stakeholders.
  • Agile thinking and analysis that leads to win-win and innovative solutions.

Interested in this position?
Fill out the form below!