Lead or support Offensive Security engagements including: Internal and external network penetration testing, Web application penetration testing, Wireless penetration testing, Social engineering (phishing, telephone, onsite), Red teaming/Threat emulation, Purple teaming.
Evaluate and test IT controls, application controls, security configurations, and interface/integration security.
Provide practical recommendations for vulnerability remediation.
Conduct cybersecurity assessments across a variety of standards/frameworks (NIST CSF, NIST 800.53, CIS, integrated control frameworks, etc.).
Present findings and recommendations to stakeholders, including IT, Information Security, C-suite and board-level leadership, through clear, concise written and verbal communication.
Serve as an extension of client teams to lead or support program execution activities, including control implementation, metrics/reporting, issue remediation, and continuous improvement initiatives.
Mentor and supervise junior consultants; contribute to team development and internal knowledge-sharing.
Participate in practice development, including service line/methodology innovation and thought leadership.
Requirements
2+ years of experience in cybersecurity, offensive security, or related consulting or industry roles.
Bachelor’s degree in information systems, Computer Science, Cybersecurity, Engineering, or related field.
Progress toward or possession of certifications such as CISSP, OSCP, OSCE, or similar.
Deep working knowledge of operating systems (Windows, Linux/Unix) and databases (SQL, Oracle, etc.).
Working knowledge of networks and the seven layer OSI model.
Proficiency with common offensive security tools and frameworks (e.g., Metasploit, Burp Suite, BloodHound, Nmap, etc.).
Detection engineering or blue team operations knowledge including evasion techniques.
Strong scripting or programming skills.
Strong project management, critical thinking, and interpersonal skills.
Excellent communication and technical writing skills, with the ability to tailor messages to both technical and executive audiences.
Experience with or curiosity about AI and automation tools in cybersecurity, including secure implementation practices and risk assessments.