Piper Companies
Red Team Security Engineer (Remote)
Red Team Security Engineer | Piper Companies | UnitedStates
Red Team Security Engineer | Piper Companies | United States
Responsibilities for a Red Team Security Engineer include:
- Evaluate global products and services to identify security vulnerabilities, weaknesses, and improvements.
- Work with amazingly creative, innovative, and collaborative security researchers to develop evolving ethical hacking skills and networking product knowledge.
- Learn to adopt an attacker mentality using tools, techniques, and processes that emulate real-world adversaries.
- Partner with industry-leading engineering teams to assess the latest system and application architectures, contribute to creative security solutions, and gain unparalleled access to and experience with the latest technologies.
Qualifications for a Red Team Security Engineer include:
- 4+ years of experience in exploit development (Offensive Programming) or cloud security.
- Red teaming or penetration testing experience with emphasis on remote access, network penetration, Command and Control development and use, and covert channels
- Advanced experience with Python, and have a Linux and Windows background
- Security testing experience, including areas like web applications, APIs, user interfaces, mobile devices, and embedded devices.
- Preferred experience with applied crypto, through implementation or analysis of crypto algorithms.
- Full-spectrum red-team tactics, such as hw hacking, physical security breach, targeted social engineering with experience in a SOC, SRE, or incident response role.
Compensation for a Red Team Security Engineer include:
- Salary range $105,000 – $175,000 depending on experience
- Comprehensive benefits package through Cigna; including Health, Dental, Vision, 401k, PTO, Sick days required by law, and Holidays
Keywords: Security engineer, security, engineer, cybersecurity, security testing, IT security, Red team, red team security, security vulnerabilities, cyber-attacks, cyber attacks, cyberattacks, security posture, reconnaissance, threat modeling, IP range, domain names, social engineering, backdoors, data exfiltration, cyber threats, red teaming, penetration testing, network penetration, command development, control development, covert channels. Exploit development, offensive programming, cloud, cloud security, Unix, security assessment, Python, Go, code, applied crypto, crypto algorithms, network protocols, DevOps engineers, DevOps, Dev Ops, API, embedded security, embedded engineering, embedded engineers, hw hacking, targeted social engineering, SOC, SRE, incident response, Windows, Linux
This job opens for applications on 12/27/2024. Applications for this job will be accepted for at least 30 days from the posting date.
Show more
Show less
Related Jobs
See more All Other Remote Jobs-
NewSave
-
NewSave
-
NewSave
-
NewSave
-
NewSave
-
NewSave
-
NewSave
-
NewSave
- Save