Cyber Security Engineer II - Purple Team

24 Minutes ago • 3 Years +
Cyber Security

Job Description

This Cyber Security Engineer II - Threat Simulation role is crucial for CME Group's Offensive Security organization, aiming to enhance the company's security posture. The position involves executing Purple Team cyber exercises on internal and internet-facing systems to improve threat detections. Additionally, the engineer will participate in Red Team activities, identifying misconfigurations and vulnerabilities exploitable by internal or external actors to gain unauthorized access. This is an excellent opportunity for a skilled cybersecurity professional to protect national critical infrastructure, working with a team of experts to defend against advanced cyber threats.
Good To Have:
  • Previous experience delivering Purple Team projects.
  • Experience creating and executing Purple Team test plans.
  • Collaboration with Blue teams in Purple Team exercises.
  • Experience using Purple Team automation tools.
  • Experience participating in Red Team engagements.
  • Experience modifying payloads to bypass EDR detections.
  • Experience using automated infrastructure provisioning tools like Terraform.
  • Experience conducting Offensive Security/Purple Team exercises against macOS.
  • Understanding of APT compromise in financial institutions.
  • Recognized industry certifications (GPEN, GXPN, GREM, eCPTX, eCPPT, OSCP, OSWE, CISSP, CPSA, CRT).
  • Knowledgeable in Industry Security standards (TIBER-EU, CBEST, NIST CSF, ISO27002).
  • Experience working in a sprint-driven environment.
Must Have:
  • Contribute to designing, scoping, and executing Purple Team exercises.
  • Work with stakeholders to improve detections through Purple Team tactics.
  • Design and execute threat intelligence-led Red Team exercises.
  • Apply MITRE ATT&CK Framework in Red Team activities.
  • Build and maintain Red and Purple team infrastructure.
  • Automate Red and Purple team functions where possible.
  • Research new offensive security tactics, techniques, and procedures.
  • Communicate offensive security knowledge to team members.
  • Conduct ad-hoc offensive security testing using industry tools.
  • Conduct ad-hoc offensive security testing using internally developed tools.
  • Contribute to report creation, including compromise narratives.
  • Provide detailed technical findings with risk severity ratings.
  • Offer tactical and strategic recommendations to reduce risk.
  • Peer review team’s deliverables.
  • Assist cyber defense teams during incident investigations.
  • Provide subject matter expertise on attacker tradecraft and mindset.
  • Interface with other information security departments.
  • Interface with other technology departments and business stakeholders.
  • Raise awareness of security issues and provide knowledge sharing.
  • Actively contribute to Red and Purple Team presentations and conferences.
  • 3+ years’ experience with penetration testing tools (Cobalt Strike, Metasploit, Burp Suite, Nmap, Covenant).
  • Strong understanding of MITRE ATT&CK framework.
  • Strong understanding of Purple Team concepts, tools, and automation.
  • Experience measuring and rating vulnerabilities.
  • Experience with Windows and Linux system hardening.
  • Experience with scripting languages (Python, Ruby, PowerShell, Bash).
  • Experience with cloud environments (AWS, GCP, Azure).
  • Experience attacking cloud, on-prem, and hybrid environments.

Add these skills to join the top 1% applicants for this job

ethical-hacking
game-texts
security-testing
ruby
macos
linux
aws
azure
threat-intelligence
terraform
nmap
powershell
metasploit
burp-suite
python
bash

Role overview

We are looking for a Cyber Security Engineer II - Threat Simulation to be an integral part of our Offensive Security organization and contribute towards improving CME Group’s security posture.

This role will be responsible for participating in the execution of Purple Team cyber exercises of internal and internet facing information systems and infrastructure. In addition, the role will require participation in Red Team activities to identify misconfigurations and cyber security vulnerabilities that could be exploited by an internal or external actor to gain unauthorized access to computer systems and data.

This is a perfect opportunity for the right person to become a key part of a team of highly skilled cybersecurity professionals who execute a pivotal role in protecting and defending national critical infrastructure.

Principal Responsibilities

  • Contribute to designing, scoping, and executing Purple Team exercises focused on working with stakeholders to execute relevant tactics, techniques, and procedures to provide information used to improve detections.
  • Contribute to designing, scoping, and executing threat intelligence led Red Team exercises against a hybrid environment using the MITRE ATT&CK Framework.
  • Build and maintain Red and Purple team infrastructure, automating functions where possible.
  • Continually research new offensive security tactics, techniques, and procedures and communicate knowledge of the same to other team members.
  • Conduct ad-hoc offensive security testing using industry standard tools and/or internally developed tools.
  • Contribute to report creation activities including compromise narratives and detailed technical findings with appropriate risk severity ratings, tactical and strategic recommendations to reduce risk levels, peer review of team’s deliverables.
  • Assist cyber defense teams during incident investigations providing subject matter expertise on attacker tradecraft and mindset.
  • Interface with other information security departments, as well as other technology departments and business stakeholders to raise awareness of security issues and to provide knowledge sharing on remediation.
  • Active contributor to Red and Purple Team activities for internal presentations and conferences

Position Requirements

  • 3+ years’ experience with industry standard penetration testing tools such as, but not limited to Cobalt Strike, Metasploit, Burp Suite, Nmap, Covenant, etc; or the ability to demonstrate equivalent knowledge.
  • Strong understanding of MITRE ATT&CK framework tactics, techniques and procedures.
  • Strong understanding of Purple Team concepts, tools, and automation strategies.
  • Experience measuring and rating vulnerabilities based on principal characteristics of a vulnerability.
  • Experience with Windows and Linux system hardening concepts and techniques.
  • Experience with at least one scripting language (Python, Ruby, PowerShell, Bash, etc.).
  • Experience with at least one cloud environment (AWS, GCP, Azure).
  • Experience attacking cloud, on-prem and/or hybrid environments from initial access all the way through actions on objective.

Nice to have

  • Previous experience of Purple Team project delivery to include creation and execution of Purple Team test plans in collaboration with Blue teams.
  • Experience of using Purple Team automation tools.
  • Experience participating in Red Team engagements.
  • Experience modifying payloads to bypass detections like EDR.
  • Experience of using automated infrastructure provisioning tooling, such as, but not limited to, Terraform.
  • Experience of conducting Offensive Security and/or Purple Team exercises against macOS
  • Understanding of how an Advanced Persistent Threat could compromise a financial institution.
  • Recognized industry certifications such as, but not limited to, GPEN, GXPN, GREM, eCPTX, eCPPT, OSCP, OSWE, CISSP, CPSA, CRT, etc.
  • Knowledgeable in Industry Security standards (i.e.: TIBER-EU, CBEST, NIST Cyber Security Framework, ISO27002, etc.).
  • Experience of working in a sprint driven work environment.

Set alerts for more jobs like Cyber Security Engineer II - Purple Team
Set alerts for new jobs by CME Group
Set alerts for new Cyber Security jobs in India
Set alerts for new jobs in India
Set alerts for Cyber Security (Remote) jobs

Contact Us
hello@outscal.com
Made in INDIA 💛💙