At a Glance
- Tasks: Join a team of expert hackers to simulate real-world cyber threats and enhance security.
- Company: IBM's X-Force Red, a leading offensive security team.
- Benefits: Competitive salary, travel opportunities, and professional growth in cybersecurity.
- Why this job: Make a real impact by helping organisations strengthen their security against advanced threats.
- Qualifications: 3+ years in red teaming and strong technical skills in security and programming.
The predicted salary is between 36000 - 60000 £ per year.
Overview
Join to apply for the Red Team Operator – X-Force Red role at IBM.
Introduction: Are you passionate about breaking into well defended networks, while evading mature detection strategies? Are you interested in joining a team of like-minded experts, many of whom have decades of experience breaking into anything and everything to help organizations strengthen their security? If so, X-Force Red, IBM Security’s team of veteran hackers, is looking for a Red Team Operator, and you may be the perfect fit.
Your Role And Responsibilities
The Red Team Operator will be part of the X-Force Red Offensive Security team. You will plan and execute remote operations dynamically emulating advanced threat actors to improve the detection and response capabilities of clients through long-term engagements. It is critical that the consultant be able to rapidly learn new technologies and processes with minimal assistance. There is a potential for up to 25% travel, including international travel.
Core Responsibilities
- Manage full adversary simulation engagements from conception to report delivery
- Communicate effectively with team members and clients during the engagement
- Keep current with the latest offensive security techniques
- Perform adversary simulation of real-world adversary Tactics, Techniques, and Procedures (TTPs) by leveraging frameworks such as MITRE ATT&CK and other sources of information
- Develop payloads, scripts and tools that weaponize new concepts for exploitation, evasion, and lateral movement
- Engage in an active evasion of defenders to avoid detection and progress engagements
- Coordinate with other Red Team operators to achieve the specified goals
- Deliver reporting and debriefs to defenders in a manner that improves detection and response capabilities
- Perform/present technical security research
Education and Expertise
Preferred Education
Bachelor\’s Degree
Required Technical And Professional Expertise
- 3+ years of red teaming experience in a dedicated red team role
- 5+ years of system administration, network administration, or programming experience
- Ability to develop/modify exploits and payloads to avoid defensive countermeasures
- Understanding of real-world adversary operations methodologies, tactics, techniques, and procedures. In particular, the ability to apply frameworks (e.g., MITRE ATT&CK) in client engagements.
- Demonstrated history of published exploitation research
- Strong analytical and problem-solving skills
- Good interpersonal, organizational, communications, and time management skills
- Experience coordinating security testing projects with multiple consultants
- Effective English writing skills
Preferred Technical And Professional Experience
- History of presenting at security conferences
- Track record in vulnerability research and CVE assignments
- Knowledge of Windows APIs
- Knowledge of EDR detection capabilities such as Carbon Black/CrowdStrike, etc. and associated evasion techniques for behavioral-based alerting
- Demonstrated exploit, payload, or attack framework development experience
- Expert level skills in one of the following: Active Directory, Software Development, or Cloud Infrastructure
- Relevant certifications from Offensive Security (OSCP/OSCE), SANS (GPEN, GXPN, GWAPT), CREST CSAT/CSAM or demonstrable equivalent skills
- Prior security consulting experience
Seniority level
- Mid-Senior level
Employment type
- Full-time
Job function
- Management and Manufacturing
- Industries IT Services and IT Consulting
Note: This listing may include referral messaging and location stamps for the job posting site.
#J-18808-Ljbffr
Red Team Operator - X-Force Red employer: IBM
Contact Detail:
IBM Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Red Team Operator - X-Force Red
✨Tip Number 1
Network like a pro! Attend industry meetups, conferences, or online webinars where you can connect with fellow security enthusiasts. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your red teaming projects, research, or any cool tools you've developed. This will give potential employers a taste of what you can bring to the table and set you apart from the crowd.
✨Tip Number 3
Practice makes perfect! Engage in Capture The Flag (CTF) competitions or contribute to open-source security projects. This not only sharpens your skills but also demonstrates your commitment to continuous learning in the field.
✨Tip Number 4
Apply through our website! We love seeing passionate candidates who are eager to join our team. Tailor your application to highlight your relevant experience and skills, and don’t forget to mention why you’re excited about working with X-Force Red!
We think you need these skills to ace Red Team Operator - X-Force Red
Some tips for your application 🫡
Show Your Passion: When you're writing your application, let your enthusiasm for offensive security shine through! We want to see that you’re genuinely excited about breaking into networks and improving security. Share any personal projects or experiences that highlight your passion.
Tailor Your CV: Make sure your CV is tailored to the Red Team Operator role. Highlight your relevant experience in red teaming, system administration, and any specific skills that match the job description. We love seeing how your background aligns with what we do at X-Force Red!
Be Clear and Concise: In your written application, clarity is key. Use straightforward language and avoid jargon unless it’s relevant. We appreciate a well-structured application that gets straight to the point while showcasing your skills and experiences.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it gives you a chance to explore more about our team and culture at StudySmarter.
How to prepare for a job interview at IBM
✨Know Your Adversary Tactics
Familiarise yourself with the MITRE ATT&CK framework and be ready to discuss how you've applied it in past engagements. This shows you understand real-world adversary operations and can think like a hacker.
✨Showcase Your Technical Skills
Prepare to demonstrate your experience in developing exploits and payloads. Bring examples of your work or projects that highlight your ability to evade detection and perform lateral movement.
✨Communicate Clearly
Effective communication is key, especially when discussing complex technical concepts. Practice explaining your past projects and findings in a way that's easy to understand for both technical and non-technical audiences.
✨Stay Current with Trends
Keep up-to-date with the latest offensive security techniques and tools. Be prepared to discuss recent developments in the field and how they might impact your approach to red teaming.