Manager, Offensive Security

Barracuda Networks Inc.Stamford, CT
12dRemote

About The Position

Barracuda is seeking a Manager, Offensive Security to lead a team of cybersecurity engineers focused on threat detection and attack stimulation across a wide range of technologies, including SaaS, endpoint, network, and cloud platforms. In this role, you will play a critical part in driving detection innovation, engineering processes, and attack and defend lifecycle for Barracuda XDR. This is a unique opportunity to blend security operations, data engineering, detection engineering, offensive security and leadership in a global 24x7 Security Operations Center (SOC). You will work with over 50 different data sources and lead efforts aligned with the MITRE ATT&CK framework, while fostering collaboration between red, purple, green and blue teams to advance threat detection and response along with ensuring overall improvement and enhancement of Barracuda Security Operations Center.

Requirements

  • 6+ years in security operations, detection engineering and offensive security
  • 2-3 years in leadership experience managing high-performing cybersecurity teams.
  • 3–4 years of hands-on experience with Python and SQL.
  • Experience with Kali and other pentesting/hacking tools
  • Developed and managed lab environments for attack and defend exercises
  • Bachelor’s or master's degree in Cybersecurity, Information Security, or related field.
  • Strong understanding of cloud platforms (AWS, Azure, GCP).
  • Experience with SIEMs like Elastic and Databricks, including advanced detection implementation.
  • Familiarity with Windows, Unix, and Linux systems.
  • Experience with threat intelligence platforms (e.g., Anomali, Cybersixgill).
  • Strong verbal and written communication skills.
  • Demonstrated ability to work across global time zones (U.S. East, India and Ireland teams).
  • Strong project management, problem-solving, and decision-making skills.
  • Ability to lead during high-pressure cybersecurity incidents and guide team response.

Responsibilities

  • Lead and mentor a team of cybersecurity Engineers
  • Develop, test and tune detection rules for multiple attack vectors across cloud, network, and endpoint telemetry.
  • Design and maintain CI/CD pipelines to version and deploy detection rules.
  • Implement and manage the full lifecycle of SIEM detection rules.
  • Foster collaboration between red and purple teams to drive offensive and defensive innovation.
  • Create and execute sprint projects using Agile methodologies to improve SOC maturity and R&D efforts.
  • Implement proactive threat hunting initiatives across customer networks.
  • Guide and monitor your team through complex security incidents such as ransomware.
  • Lead adversary simulation exercises and exploit research initiatives
  • Design and execute detection testing scenarios and breach simulations
  • Conduct tabletop exercises and kill chain rehearsals
  • Develop and manage a open-source red teaming repository for attacks and stimulations
  • Develop threat modeling frameworks and campaign replay scenarios
  • Conduct and manage live “attack and defend” exercises to test detection and response readiness
  • Implement proactive threat hunting initiatives across customer networks
  • Lead efforts in identifying emerging TTPs and zero-day discovery
  • Oversee malware analysis and hunt campaigns
  • Drive trend analysis and adversary profiling initiatives
  • Manage threat publications such as blogs, webinars, and podcasts.
  • Drive strategic planning, goal setting, and roadmap execution.
  • Ensure key SOC metrics, SLAs, and detection performance standards are met.
  • Coordinate and maintain a global 24x7x365 on-call schedule.
  • Provide regular reporting and weekly metrics related to Level 5 operations.
  • Serve as a key point of escalation for critical security incidents.
  • Lead implementation of new rules based on evolving vulnerabilities and adversary TTPs.
  • Lead R&D for emerging use cases, tools, and integration efforts.
  • Guide to the evaluation and adoption of new technologies aligned with future-facing cyber defense.
  • R&D around use of AI and automation for offensive security.

Benefits

  • A team where you can voice your opinion, make an impact, and where you and your experience are valued.
  • Internal mobility – there are opportunities for cross training and the ability to attain your next career step within Barracuda.
  • Equity, in the form of non-qualifying options
  • High-quality health benefits
  • Retirement Plan with employer match
  • Career-growth opportunities
  • Flexible Time Off and Paid Time Off benefits
  • Volunteer opportunities
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service