About The Position

Your role Are you passionate about the offensive side of cyber security and research? Are you someone who likes to bridge the gap between the technical aspects of emulating attacker TTPs and how this will strengthen the security posture of your business? Are you self-driven, motivated and have experience working on a global security team? We are looking for a Cyber Defense Operational Security Testing Red Team Operator / Security Tester to: join a growing in-house red teaming and offensive security capability execute all phases of offensive security operations participating in both red and purple team testing develop scripts, tooling, and methodologies to support offensive security capabilities.• assist in providing risk appropriate and pragmatic recommendations to correct identified findings, vulnerabilities, and misconfigurations understand and adhere to regulatory, compliance, and legal requirements that impact business operations document and capture detail at the right level of abstraction while creating process/dataflow/architecture diagrams, or documenting instructions Join us At UBS, we know that it's our people, with their diverse skills, experiences and backgrounds, who drive our ongoing success. We're dedicated to our craft and passionate about putting our people first, with new challenges, a supportive team, opportunities to grow and flexible working options when possible. Our inclusive culture brings out the best in our employees, wherever they are on their career journey. We also recognize that great work is never done alone. That's why collaboration is at the heart of everything we do. Because together, we're more than ourselves. We're committed to disability inclusion and if you need reasonable accommodation/adjustments throughout our recruitment process, you can always contact us. Your expertise ideally, 3 years or more of experience in an offensive security role, such as penetration testing, and a desire to move into the world of red and purple teaming experience and proficiency in the day-to-day operations of a Red Team with knowledge of offensive security tools, such as Metasploit, Nessus, Burp, Kali Linux / CommandoVM or C2 frameworks (e.g. Cobalt Strike, Brute Ratel, Sliver, Nighthawk) experience in setting up infrastructure for Red Teaming operations and techniques utilized in reconnaissance, exploitation, persistence, lateral movement, command & control, etc. experience in automation using Python, Bash, or other scripting language ideally coupled with the ability to experiment and tweak newly developed open-source tools written in scripting language knowledge and understanding of MITRE ATT&CK framework and TTPs of cyber-attacks at a conceptual level as well as knowledge and understanding of OPSEC concepts in attack emulation experience in a blue team role investigating cyber security incidents in a modern enterprise security environment (including SIEM, EDR, etc) or experience in system administration or engineering experience with Linux and Windows operating systems are pluses, experience with OSINT, phishing / social engineering, vulnerability research, reverse engineering , exploit development and experience with cloud (Azure, AWS) technologies and experience programming in C, C++, C#, Rust, Nim or in Assembly are pluses Offensive Security certifications (such as OSCP or OSEP), SANS certifications (such as GXPN, GPEN, GWAPT, GREM), or other training in red teaming operations are a plus "At UBS, we appreciate our Veterans and are committed to providing opportunities in Financial Services." LI-UBS UBS-MOGUL About us UBS is the world's largest and the only truly global wealth manager. We operate through four business divisions: Global Wealth Management, Personal & Corporate Banking, Asset Management and the Investment Bank. Our global reach and the breadth of our expertise set us apart from our competitors. We have a presence in all major financial centers in more than 50 countries.

Requirements

  • 3 years or more of experience in an offensive security role, such as penetration testing, and a desire to move into the world of red and purple teaming
  • experience and proficiency in the day-to-day operations of a Red Team with knowledge of offensive security tools, such as Metasploit, Nessus, Burp, Kali Linux / CommandoVM or C2 frameworks (e.g. Cobalt Strike, Brute Ratel, Sliver, Nighthawk)
  • experience in setting up infrastructure for Red Teaming operations and techniques utilized in reconnaissance, exploitation, persistence, lateral movement, command & control, etc.
  • experience in automation using Python, Bash, or other scripting language ideally coupled with the ability to experiment and tweak newly developed open-source tools written in scripting language
  • knowledge and understanding of MITRE ATT&CK framework and TTPs of cyber-attacks at a conceptual level as well as knowledge and understanding of OPSEC concepts in attack emulation

Nice To Haves

  • experience in a blue team role investigating cyber security incidents in a modern enterprise security environment (including SIEM, EDR, etc) or experience in system administration or engineering experience with Linux and Windows operating systems
  • experience with OSINT, phishing / social engineering, vulnerability research, reverse engineering , exploit development and experience with cloud (Azure, AWS) technologies and experience programming in C, C++, C#, Rust, Nim or in Assembly
  • Offensive Security certifications (such as OSCP or OSEP), SANS certifications (such as GXPN, GPEN, GWAPT, GREM), or other training in red teaming operations

Responsibilities

  • join a growing in-house red teaming and offensive security capability
  • execute all phases of offensive security operations participating in both red and purple team testing
  • develop scripts, tooling, and methodologies to support offensive security capabilities.
  • assist in providing risk appropriate and pragmatic recommendations to correct identified findings, vulnerabilities, and misconfigurations
  • understand and adhere to regulatory, compliance, and legal requirements that impact business operations
  • document and capture detail at the right level of abstraction while creating process/dataflow/architecture diagrams, or documenting instructions

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Industry

Securities, Commodity Contracts, and Other Financial Investments and Related Activities

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service