GuidePoint Security is a rapidly growing cybersecurity company that provides trusted expertise and solutions to help organizations minimize risk. As an Attack Simulation Engineer, you will operate automated penetration testing platforms and validate vulnerabilities to improve clients' risk posture while mentoring team members and contributing to the practice's growth.
Responsibilities:
- Deliver CSV services, including, but not limited to Continual and Coordinated penetration testing, Automated Assessments, Hybrid Assessments, Automated Remote Social Engineering Assessments, and Breach & Attack Simulation Assessments
- Assist with technical oversight/quality assurance of CSV assessments as needed
- Author comprehensive assessment deliverables that are proficiently tailored to both technical and managerial audiences and fully detail the technical execution, core deficiencies, business impact, and realistic remediation strategies
- Contribute to marketing initiatives via activities such as publishing research, speaking at industry conferences, authoring blog articles and whitepapers, hosting webinars, and developing security tools
- Perpetually strengthen relevant skills, knowledge, and abilities to stay at the forefront of the information security industry
- Assist in the pre-sales process for both the services and the tools we support, attending and performing demos as required
- Foster strong client relationships and represent GuidePoint well by providing interactive and collaborative support, information, and guidance to ensure delivery of maximum value
- Serve as a Subject Matter Expert over one of the Practice's main offering areas (Remote Social Engineering, Automated Penetration Testing, or Breach & Attack Simulation), including maintaining vendor certifications as they are available
- Serve as an escalation point for abnormal findings, properly triage, and escalate as needed
- Maintain situational awareness of the client's technology architecture, known weaknesses, solutions used for monitoring and threat intelligence, and any recent security events
- Ensure that identified vulnerabilities are promptly validated and thoroughly investigated
- Devise and document new procedures and runbooks/playbooks as directed
- Maintain established Service Level Agreements (SLAs)
- Attend GuidePoint GPSEC conferences as necessary to meet with account executives and clients regarding our services
Requirements:
- Familiarity with offensive security tools used for network, host and application security testing
- Experience in security technologies such as automated penetration testing tools, Breach & Attack Simulation Tools, Security Information and Event Management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint Detection and Response (EDR), Anti-Virus, Sandboxing, network- and host-based firewalls, Threat Intelligence, Virtual Machines, etc
- Advanced knowledge of at least one security tool from within the following domains: Automated Penetration Testing and Breach & Attack Simulation (i.e. Horizon3, Pentera, SafeBreach, Picus, etc…)
- Experienced in client delivery for high-profile clients (i.e. Fortune 100) with utmost professionalism
- Pentest+ Certification or equivalent, and in pursuit of OSCP (or other lab-based certification)
- Minimum of two (2) years of experience in security operations
- Minimum of one (1) year of experience in performing continual and coordinated penetration testing
- Minimum of four (4) years working in an IT or IT Security environment
- Assess network security postures for enterprise-level infrastructures by utilizing industry-standard approaches for conducting vulnerability assessments and penetration testing
- Possess in-depth knowledge of formal assessment methodologies, as well as when to use intuition to creatively deviate from established processes
- Identify common vulnerabilities through the use of automated tools and practical analysis
- Identify obscure vulnerabilities by leveraging your expertise through manual analysis
- Perform safe and reliable exploitation (to the extent possible) for exploitable vulnerabilities
- Understand network, operating system, and application-based detective and preventative controls and evade and/or circumvent such controls effectively
- Quickly and efficiently perform post-exploitation activities to demonstrate the impact of compromise
- Knowledge of common open-source tools, such as Nmap, Metasploit, and the Kali Linux Suite (or equivalent)
- Proficient with scripting languages, such as Ruby, Python, Bash, PowerShell, etc
- Proven ability to write code to solve problems and automate tedious and time-consuming tasks during assessments
- Possess a solid understanding of TCP/IP, networking technologies, network segmentation, and vendor-specific technologies, such as Cisco and Juniper
- Possess a solid understanding of firewall concepts and vendor-specific technologies, such as Cisco, Palo Alto, and Checkpoint
- Possess a solid understanding of operating systems, such as Microsoft, Linux, and various Unix variants
- Strong overall practice knowledge and problem-solving abilities (i.e., ability to handle tricky client/project situations with little to no assistance)
- Ability to think outside the box when presented with complex problems
- Prizes continuous improvement and desires to aid with practice development as much as personal growth
- Possess a desire to mentor and manage other team members and have a passion for sharing knowledge
- Ability to professionally interact with clients and maintain composure while resolving difficult situations
- Self-motivated and able to work independently, as well as being a reliable addition to team projects
- Ability to effectively multitask and efficiently manage time when simultaneously working on multiple projects
- Possess a firm understanding of the concept of risk as it relates to a business
- Strong verbal communication skills include clearly articulating thoughts, being persuasive, and delivering presentations and training to technical audiences and all management levels
- Excellent written communication skills for preparing formal deliverables, performing quality assurance reviews, and technical oversight for peers, proposals, training content, and white papers/blog articles
- Comfortable interacting with executive management and conveying technical findings in an appropriate business context
- Internal security operations experience is strongly preferred
- InfoSec community involvement, such as conference speaking, blog/whitepaper authoring, and podcast speaking/producing experience is strongly preferred
- Proficiency with web application attacks (e.g., OWASP Top 10) is strongly preferred
- Contributions to the information security community are strongly preferred, such as conference speaking, blog articles/white papers, and/or podcasts