Our organization requires a Cyber Purple Team Operator to enhance our cybersecurity measures.
The ideal candidate will be responsible for developing and executing advanced intelligence-lead adversary simulations to identify potential security gaps.
This role necessitates a deep understanding of threat actor tactics, techniques, and procedures (TTPs).
We are seeking an individual with hands-on experience in red teaming, blue teaming, or both.
Strong knowledge of the MITRE ATT&CK framework is required, as well as proficiency in coding/scripting languages such as Python, Power Shell, or Bash.
A strong understanding of cybersecurity principles, including SIEM, IDS/IPS, and endpoint detection and response (EDR) solutions, is also necessary.
Experience with Offensive Security and Purple Team tools, e.g., Cobalt Strike, Metasploit, Caldera, Mythic, is highly desirable.
Key responsibilities include:
• Performing intelligence-led adversary simulation exercises
• Providing recommendations to security operations teams for improving controls and defenses based on adversary simulation exercises
• Assisting security operations teams to continuously test and improve detections, logging, SIEM use cases, and incident response playbooks
• Staying up-to-date on the latest attack tactics, techniques, and procedures (TTPs) used by threat actors
• Continuous improvement of the organization's security posture by identifying gaps in processes and technology, and evaluating existing security controls