Atlanta, GA
|
Security Engineering
|
Contract-to-perm
|
$8 - $10 (hourly estimate)
{"JobID":508270,"JobType":["Contract-to-perm"],"EmployerID":null,"Location":{"Latitude":-84.47,"Longitude":33.86,"Distance":null},"State":"Georgia","Zip":"30339","ReferenceID":"ATL-b7391adc-51cb-45fb-b0d9-ba3db9a9ac7e","PostedDate":"\/Date(1773864414000)\/","Description":"Design and execute attack scenarios mapped to MITRE ATT\u0026CK techniquesAssist in maintaining and enhancing internal offensive security toolkits and operator playbooksDevelop or modify scripts in Python, PowerShell, and Bash to support Red Team activitiesConduct phishing, vishing, and other social engineering attacks to assess human-layer riskMaintain strict operational security during engagements, including infrastructure hygiene, traffic obfuscation, and log minimizationEnsure all engagements are executed safely without disrupting production environmentsProduce detailed technical reports documenting attack paths, vulnerabilities, and exploitation techniquesMap findings to MITRE ATT\u0026CK techniques and provide clear, actionable remediation guidanceParticipate in purple team debriefs to help defensive teams understand attacker techniques and detection improvement opportunitiesCollaborate closely with SOC, Incident Response, and engineering teams to validate detections and enhance defensive capabilitiesSupport the development of detection use cases, logging improvements, and incident response playbooksPay Rate will be between $10-$14 an hour depending on skills and experience.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Senior Engineer- Compliance- Red Team Specialist","City":"Atlanta","ExpirationDate":null,"PriorityOrder":0,"Requirements":"Required Experience4?7 years of experience in Information Security Compliance, Red Team, or a related fieldProven experience conducting Red Team assessments and infrastructure penetration testingHands-on experience operating within Red Team environmentsEssential SkillsAbility to execute end-to-end attack chains, including reconnaissance, exploitation, lateral movement, persistence, and exfiltrationConduct internal and external attack simulations emulating realistic threat actor TTPsDemonstrated experience with exploitation, privilege escalation, lateral movement, and post-exploitation techniques across Windows and Linux environmentsStrong understanding of network protocols, authentication mechanisms, and common security misconfigurationsPerform web application, infrastructure, and cloud-focused attacks as part of multi-vector engagementsExperience utilizing command-and-control (C2) frameworks such as Cobalt Strike, Empire, or Covenant to develop and manage covert operationsProven ability to think creatively and simulate an attacker mindsetAbility to operate discreetly and ethically under strict confidentiality controlsProvide training and delegate tasks to lower-level security engineersExcellent written communication and technical documentation skillsCollaborate with analysts and engineers to test, validate, and deploy remediation fixesDesired SkillsExperience with Active Directory attack paths, including Kerberoasting, AS-REP Roasting, constrained and unconstrained delegation abuse, DCsync/DCshadow, and BloodHound path reductionPractical offensive security experience in Azure/Microsoft 365 (Entra ID) and/or Google Cloud Platform (GCP), including identity abuse, misconfigured roles and policies, workload identity takeover, OAuth application abuse, and cross-tenant risksInitial access tradecraft, including macro-less delivery, HTA/JavaScript techniques, OAuth abuse, token replay, and cloud misconfiguration pivotsExperience building operator-grade tools using Python, Go, or PowerShell beyond simple scripting (e.g., custom loaders, C2 extensions, OPSEC-safe reconnaissance tooling)Advanced web exploitation techniques such as SSRF metadata pivots, deserialization chains, cache poisoning, and template injectionKnowledge of API attack patterns, including authentication and authorization flaws, mass assignment, BOLA vulnerabilities, and GraphQL nuancesExposure to mobile application or thick-client security assessmentsUnderstanding of blue team telemetry (e.g., Sysmon, Microsoft Defender for Endpoint, Splunk) to plan stealthy operations and propose detection use cases from an offensive perspectiveAwareness of evidence handling and clean artifact capture to support post-engagement analysisExperience with Red Team infrastructure buildout, including domain fronting, redirector chains, TLS fingerprinting evasion, staging servers, and resilient DNS configurationsAbility to deliver executive-ready storytelling, including attack path narratives, business impact translation, and risk-based remediation roadmapsStrong visual reporting skills, including attack flow diagrams, MITRE ATT\u0026CK heatmaps, and kill chain overlaysExperience leading a Red Team workstream (e.g., phishing, Active Directory, cloud) and mentoring junior operatorsExposure to Red Team operations in regulated environments (PCI, SOX, HIPAA) with appropriate safe-testing controls","Skills":"","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":10.0000,"SalaryLow":8.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}
Design and execute attack scenarios mapped to MITRE ATT&CK techniquesAssist in maintaining and enhancing internal offensive security toolkits and operator playbooksDevelop or modify scripts in... Python, PowerShell, and Bash to support Red Team activitiesConduct phishing, vishing, and other social engineering attacks to assess human-layer riskMaintain strict operational security during engagements, including infrastructure hygiene, traffic obfuscation, and log minimizationEnsure all engagements are executed safely without disrupting production environmentsProduce detailed technical reports documenting attack paths, vulnerabilities, and exploitation techniquesMap findings to MITRE ATT&CK techniques and provide clear, actionable remediation guidanceParticipate in purple team debriefs to help defensive teams understand attacker techniques and detection improvement opportunitiesCollaborate closely with SOC, Incident Response, and engineering teams to validate detections and enhance defensive capabilitiesSupport the development of detection use cases, logging improvements, and incident response playbooksPay Rate will be between $10-$14 an hour depending on skills and experience.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.