Overview
The ConEd Red Team focuses on performing real-world attacks and adversarial simulation to protect some of the nation's most critical infrastructure by proactively identifying attack chains that lead to sensitive information or potential service disruption. Work activities range from traditional penetration testing to complex, custom scenarios with the intent of bypassing security controls, avoiding detection, and obtaining sensitive levels of access or information. This is a new initiative where all team members are expected to assist with maturing the program and developing creative attack scenarios. ConEd's cloud environments, publicly available services, internal IT and OT infrastructure, and customer-facing and internal applications are all within scope. Red Team members will monitor trends, scenarios, and the changing threat landscape and will coordinate with the broader cyber security and infrastructure teams to take appropriate actions on both immediate needs and regularly scheduled cadences. The team also has related responsibilities to provide guidance and direction to its blue team counterparts and bolster the overall security posture and capabilities of the organization's cyber security program.
Responsibilities
Core Responsibilities
- Act as a senior technical resource, mentor team members, and contribute to the development of the ConEd Red Team Program.
- With oversight from management and the lead analyst, competently perform a variety of penetration testing, red team, and social engineering assessment activities that are of comparable sophistication to real-world adversarial attacks.
- Develop assessment strategies with key stakeholders.
- Create accurate documentation that provides concise explanations and conveys informative descriptions of findings, including technical explanations/walkthroughs, root causes, impact, and remediation/mitigation strategies.
- Continuously learn, improve, and hone your skills to deliver advanced assessments.
- Develop scripts and tools to automate tedious processes and increase efficiency.
- Stay abreast of TTPs, global security incidents, industry trends, advisories, publications, research, talks, and other relevant developments
- Effectively communicate technical concepts to non-technical audiences.
- Coordinate with business owners to remediate/mitigate findings and verify changes are successful.
- Represent the department in the company and industry with research, talks, publications, articles, posts, training, etc.
- Assist with developing internal methodologies and process improvement for the team, including mentoring and transferring knowledge across team members.
- Collaborate with blue teams to bolster detection and response capabilities.
Resources Managed
- Management # of Direct Reports: Indirect Reports:
- Weekly # of Direct Reports: Indirect Reports:
Qualifications
Required Education/Experience
- High School Diploma/GED and Minimum of five (5) years in information security, with a minimum of one (1) years in a red team or penetration testing role. Utility industry experience preferred. or
- Associate's Degree and Minimum of four (4) years in information security, with a minimum of one (1) years in a red team or penetration testing role. Utility industry experience preferred. or
- Bachelor's Degree and Minimum of three (3) years in information security, with a minimum of one (1) years in a red team or penetration testing role. Utility industry experience preferred.
Preferred Education/Experience
- Bachelor's Degree Information Technology, Computer Science, Math, Engineering or business related disciplines.
- Master's Degree Information Technology, Computer Science, Math, Engineering or business related disciplines.
Relevant Work Experience
- Less than 2 years Perform OSINT/Reconnaissance to identify publicly damaging information, misconfigurations, and interesting targets Required
- Less than 2 years Perform scoping, define rules of engagement, and deliver assessments from kickoff through remediation Required
- 3-5 years Be experienced with common pentesting platforms, such as Kali Linux, as well as related tooling, such as for network analysis (e.g. nmap), vulnerability analysis (e.g. Nessus), exploitation (e.g. Metasploit), and web app pentesting (e.g. Burp Suite) Required
- 3-5 years Possess a solid understanding of network architecture and design, network protocols, covert channels, encryption, and data exfiltration Required
- 3-5 years Be experienced with Windows, Mac, Linux, Unix operating systems, virtualization, storage, databases, and other related systems and technologies and their respective security considerations Required
- 3-5 years Possess a thorough understanding of network/systems pentesting procedures Required
- 3-5 years Be able to differentiate between safe and risky/dangerous techniques Required
- 3-5 years Be able to communicate to both technical and executive/business audiences Required
- 3-5 years Be able to work independently and within a team Required
- Less than 2 years Be comfortable and effective working remotely within a distributed team Required
- Less than 2 years Coach teams to build in security by design Required
- 3-5 years Leverage critical thinking and creativity; think outside the box and do not rely on tooling Required
- 3-5 years Effectively manage large amounts of information from complex environments and applications Required
- 3-5 years Possess a deep understanding of general information security concepts and defensive controls, such as risk management, governance, compliance, least privilege, network monitoring, malware protection and analysis, endpoint security, DLP, intrusion detection/prevention, and SIEM systems Preferred
- 3-5 years Be familiar with assessment frameworks, such as MITRE ATT&CK, PTES, OSSTMM, OWASP Testing Guide, etc. Preferred
- Less than 2 years Possess a detailed understanding of systems/network hardening, secure coding practices, and mitigation/remediation strategies Preferred
- Less than 2 years Be able to perform assessment activities in a quiet/stealthy manner and circumvent security controls Preferred
- 3-5 years Be competent with one or more scripting languages, such as Bash, PoSh, Python, Ruby, etc. Preferred
- Less than 2 years Be able to perform threat modeling and possess an in-depth understanding of threat and vulnerability analysis Preferred
- 2 years Familiarity with several web development languages, such as Java, PHP, Ruby on Rails, C#/ASP.NET, SQL, Go, Javascript/Node, HTML, etc. Preferred
- The ability to perform exploit development/modification and reverse engineering is preferred Preferred
- Be competent with wireless penetration testing procedures and wireless technologies; experience beyond 802.11 (e.g. Bluetooth, Zigbee, etc.) is preferred Preferred
- Possess an understanding of physical security controls and their weaknesses Preferred
- Have experience with phishing, vishing, and/or on-site/in-person social engineering Preferred
- Be competent with application, mobile, and API penetration testing procedures; the ability to perform source code review is preferred Preferred
- Be familiar with cloud computing concepts, cloud-native services, and DevOps (CI/CD, Kubernetes, etc.) Preferred
- Experience with assessing IoT devices is preferred Preferred
- Provide thought leadership within the organization and the industry Preferred
- Participation in challenges and CTF events (Hack the Box, Pentester Academy Labs, etc.) is preferred Preferred
- Interest in research and published CVEs are preferred Preferred
Skills And Abilities
- Strong written and verbal communication skills
- Ability to drive multiple projects to successful completion
- Develops and delivers effective presentations
Licenses And Certfications
- Driver's License Required
- Other: OSWP, OSCP, OSCE, OSEP, OSWE, OSED, OSEE, GPEN, GCIH, GPXN, GWAPT, GMOB, GAWN, GCPN, and/or similar certifications are preferred Preferred
Physical Demands
- Must push, pull, lift up to 25 pounds
- Must sit or stand to use a keyboard, mouse, and computer for entire shift
Additional Physical Demands
- Must be able to respond to Company emergencies by performing a System Emergency Assignment to restore service to our customers.
- Must be able and willing to travel within Company service territory, approximately quarterly, but also as-needed.