The Opportunity
Within our Enterprise Cybersecurity organization, you will work closely with the Security Intelligence team and be responsible for leverage real world adversarial techniques to perform pen tests and simulate attacks on existing and upcoming services spanning across applications, servers, and end-user assets.
The Team
Within the Security Operations Center, partner with Incident Response Teams for Red/Purple Team assessments and work with Security Intelligence to identify and test real world adversarial tactics, techniques, and procedures.
The Impact
Utilize both manual and automated methods to conduct penetration tests and to determine a risk score and recommend mitigations that can be used to reduce risk to the firm.
Key Responsibilities
- Provide technical guidance and hands-on leadership in security operations, with a focus on threat detection, adversary simulation, and countermeasure development.
- Lead threat research, detection, and response efforts, including the development and maintenance of advanced detection content and threat hunting missions.
- Analyze and synthesize intelligence from various sources to identify risks and provide actionable insights.
- Oversee and execute adversary simulation exercises (red/purple team) to evaluate and enhance security controls and incident response effectiveness.
- Research and develop offensive security techniques, tools, and automation frameworks to improve simulation and testing capabilities.
- Advise on threat mitigation strategies for emerging threats and vulnerabilities.
- Lead and support incident response engagements and provide expert advisory on scoping, containment, and eradication strategies.
The Minimum Qualifications
- Bachelors degree
- 8+ years of experience in information security, focusing on threat detection, incident response, adversary simulation (red and purple teaming) and/or relative experience
The Ideal Qualifications
- Degree in Cyber Security, Computer Science, or Criminal Justice with a focus in Cyber Security
- 10+ years of experience in information security, focusing on threat detection, incident response, and adversary simulation (red and purple teaming).
- Proven ability to lead and develop threat hunting, detection engineering, and offensive security programs.
- Expertise in developing advanced threat detection rules, both signature-based and behavior-based analytics.
- Hands-on experience with offensive security tools such as CobaltStrike, Mythic, Evilginx, Outflank C2, and OST.
- Proficient in multiple programming languages including Python, C#, C/C++ and GoLang and familiarity with Windows/MacOS internals.
- Proficient in infrastructure automation using Terraform, Ansible, and CloudFormation.
- Proficient with SIEM and EDR platforms, including but not limited to Splunk, SumoLogic, and CrowdStrike Falcon EDR/LogScale.
- Strong understanding of identity management platforms like Okta, Microsoft EntraID, and Active Directory, including identity-based attacks.
- Security automation expertise using Python scripting, Palo Alto Cortex XSOAR, and GitOps practices.
Preferred Certifications
- Offensive Security Certified Professional (OSCP)
- Certified Red Team Operator (CRTO)
- GIAC Certified Cloud Forensics Responder (GCFR)
- GIAC Certified Forensics Analyst (GCFA)
- Certified Red Team Leader (CRTL)
MassMutual is an Equal Employment Opportunity employer Minority/Female/Sexual Orientation/Gender Identity/Individual with Disability/Protected Veteran. We welcome all persons to apply. Note: Veterans are welcome to apply, regardless of their discharge status.
If you need an accommodation to complete the application process, please contact us and share the specifics of the assistance you need.