DivIHN (pronounced “divine”) is a CMMI ML3-certified Technology and Talent solutions firm. Driven by a unique Purpose, Culture, and Value Delivery Model, we enable meaningful connections between talented professionals and forward-thinking organizations. Since our formation in 2002, organizations across commercial and public sectors have been trusting us to help build their teams with exceptional temporary and permanent talent.
Visit us at https://divihn.com/find-a-job/ to learn more and view our open positions.
Please apply or call one of us to learn more
For further inquiries regarding the following opportunity, please contact one of our Talent Specialists
Lavanya | 224 369 0873
Title: IT Security Director (Remote)
Location: Remote ( with the requirement to work in the Central Time zone)
Duration: 12 Months
Time Frame: Potential for conversion from contract to permanent
Description
Duties:
- Lead planning, scoping, execution, and reporting of red team, purple team, and penetration test assessments involving client people, processes, and technologies.
- Demonstrate expertise in simulating/emulating threat actor tactics, techniques, and procedures (TTPs) and reconnaissance, social engineering, cloud, web application, API, infrastructure, network, and physical security testing techniques.
- Demonstrate expertise in command and control (C2) and payload development and modification to circumvent network and endpoint security controls (e.g., EDR, NDR, etc.).
- Develop and deploy tooling, services, infrastructure, etc. as needed.
- Collaborate with information security teams to improve prevention, detection, and response capabilities and provide guidance and support to teams risk managing assessment findings.
- Improve operational efficiency and grow Ethical Hacking capabilities by building, adapting, evaluating, and automating tooling, infrastructure, services, processes, procedures, methodologies, playbooks, templates, and knowledge bases.
- Research and integrate the latest tools, tactics, techniques, procedures, and developments in vulnerability research, exploitation, privilege escalation, defense evasion, lateral movement, and means of achieving objectives into new or existing capabilities.
- Exhibit professionalism, act ethically and with integrity, operate securely, ensure consistent high-quality practices/work, and achieve business results in alignment with client strategies and productivity goals.
- Hands-on malware creation.
- Engaging with other technical team members
- Collaborating as part of a team (typically 2-3 members), not in a lead role
- Perform other duties as required.
Skills
In-depth knowledge of methodologies, frameworks, tactics, techniques, procedures, and tools that promote effective testing, analysis, and the ability to determine root causes and create solutions that resolve risk in the best interest of the business. Proficient in the use of testing frameworks, tools, and scripting and development languages, such as Kali Linux, Cobalt Strike, OST, Burp Suite, Docker, etc. In-depth knowledge of Active Directory, Windows and Linux internals, social engineering, simulation/emulation planning, and circumventing security controls. Experience collaborating with developers, administrators, engineers, architects, and internal and external stakeholders to drive effective planning, scoping, execution, and risk management. Experience conducting penetration testing, red team, and/or purple team assessments as a consultant or a demonstrated ability to support multiple concurrent assessments. Experience writing and delivering technical reports and performing technical reviews and quality assurance. In-depth knowledge of MITRE ATT&CK, OWASP, CWE, CVSS, and secure system and software development practices. Excellent communication skills (both written and oral); able to concisely communicate and present risk to both technical and non-technical audiences. Experience with AWS, Azure, GCP, Kubernetes, and/or cloud-native technologies. Contributions to the security community such as research, public CVEs, bug-bounty recognitions, open-source projects, and blogs or publications desired. Ability to travel as assessments and operations require ( Writing code for security controls
Education
Bachelor's Degree in Computer Science, Cybersecurity, Information Technology, or related discipline or equivalent work experience.
Typically a minimum of five years of information security experience (red teaming, purple teaming, penetration testing, cloud security, and/or network security).
Typically a minimum of five years of experience with scripting or development languages (Python, C, C++, C#, Go, Nim, Rust, Bash, SQL, PowerShell, assembly, etc.).
Applicable certifications preferred (CRTL, CRTO, OSCP, OSEP, OSEE, CRTP, CRTE, GPEN, GXPN)
English( Speak, Read, Write )
Preferred Background
Completed High School (Diploma or GED)(Minimum required).
- Ethical hacking experience
- Diverse and interesting backgrounds.
Years Of Experience
No specific requirement, but GCP, access control, and cloud experience are highly desirable
Skills Required
- MALWARE, C#, C++, ACTIVE DIRECTORY
Additional Skills
- Scripting
- SQL
- Linux
- Physical Security
- GCP
- Excellent Communication Skills
- API
- Quality Assurance
- Operations
- Assembly
- Python
- Kubernetes
- Structured Software
- Amazon Web Services
- Docker
- Welding
- Shell Scripting
- Trading
- Risk Management
Functional Skills
- Delivering results
- Collaborating effectively
- Adaptable and flexible
Key Focus Areas
- Red Team operations
- Penetration testing
- Threat intelligence
- Writing code for security controls
- Development background
Interview Process: 2 to 3 rounds
About Us
DivIHN, the 'IT Asset Performance Services' organization, provides Professional Consulting, Custom Projects, and Professional Resource Augmentation services to clients in the Mid-West and beyond. The strategic characteristics of the organization are Standardization, Specialization, and Collaboration.
DivIHN is an equal opportunity employer. DivIHN does not and shall not discriminate against any employee or qualified applicant on the basis of race, color, religion (creed), gender, gender expression, age, national origin (ancestry), disability, marital status, sexual orientation, or military status.