Conduct Cloud Red Team Blue Team (CRTBT, also known as Cloud Purple Team) engagements as a Blue Teamer
Support the customer’s SOC/IR team in threat hunting and incident response activities
Collaborate with CrowdStrike Red Teamer using techniques characteristic of real breach attempts to generate potential detections
Work closely with customers to understand existing controls and practices and make recommendations
Manage projects from kickoff call through to report delivery
Identify and implement long-term enhancements to the CRTBT offering that will better enable clients to stop and recover from breaches
Requirements
2-3 years experience in incident response consulting services or MSSP roles
Strong background in one or more public cloud platforms (typically AWS, Azure infrastructure, Microsoft Entra ID/M365 & GCP)
1-2 years conducting Red Team Blue Team or Purple Team exercises
5+ years cybersecurity industry experience overall, ideally in hands-on roles including security engineering, detection engineering, etc.
Experience in multiple security technologies, including at least one log search engine/SIEM (Splunk, Azure Sentinel, LogScale, etc.)
Experience with building and growing strategic relationships with client mid-level managers and executives
Customer-facing project management with a keen eye toward customer service
Experience implementing information security programs within domains such as endpoint security, cloud security, network security, threat intelligence, or security operations centers is helpful
Demonstrated ability to excel in a fast-paced professional services environment and ability to balance competing priorities while still maintaining focus on details
Proven track record in technical and creative problem solving coupled with analytical expertise to provide quick resolution to problems