drjobs Red Team Operator

Red Team Operator

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Paris - France

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Education

Bachelor degree in Computer Science Engineering project management or related field.

Certification

Information Security and/or Information Technology industry certification (CISSP CISA CISM GIAC CRISC OSCP OSCE Crest or equivalent) preferred

Overall work experience in the field

  • Experience in assurance testing/red team/penetration testing activities > 3 years
  • Experience with project management and coordination < 3 years
  • Experience of working with specific Information Security Controls and Vulnerability Databases > 3 years
  • Experience in network and/or firewall engineering administration design and implementation including experience in applying methodologies and principles for all levels of Information Security< 3 years
  • Experience with technologies tools and process controls to minimize risk and data exposure < 3 years

Skills / abilities

  • Ability to function effectively in a matrix structure
  • Good facilitation negotiation and conflict resolution skills
  • Good networking skills
  • Team player
  • Apply analytical rigor to understand complex business scenarios
  • Fluent in English
  • Ability to organize

AXA is becoming a sustainable techled company and at AXA Group Operations we are one of the major catalysts for this transformation. We set the tone by triggering and empowering the evolution of our insurance business model through technology and innovation driving its concrete implementation globally at speed with a high quality of advisory and . We are present across 17 countries with committed highly qualified teams. We leverage technology data sourcing security and investment allocation in a global way but also achieve economies of scale and synergies when necessary. At AXA Group Operations we want to be recognized in three fields of action: Stateoftheart Data Technology to drive customer experience Stateoftheart Procurement & Sourcing to drive efficiency and better manage risks HighPerforming Global Team for stronger partnerships with AXA entities

As a worldleading insurance company we act for human progress by protecting what matters. With 153000 employees in 54 countries working with 105 million customers weve created a truly dynamic and vibrant community. Inclusion and diversity link closely with our values and together were nurturing a culture of respect for each other for our customers and the communities around us. Join AXA and youll feel like you belong are included and can thrive. Youll be able to shape the way you work and truly grow your potential as you seek out new opportunities push boundaries and benefit people in critical moments of their lives. This is your chance to build the tomorrow you want. Know you can.

CONTEXT

To support our business strategy and digital transformation AXA is building a new Group Information Security Practice to ensure a coordinated response to the increasing cyber security threat enable risk decisions to be made consistently across the organization and establish sustainable security capabilities that are integrated with the business. Our vision for Information Security is to protect our stakeholders by securing our information assets managing our cyber risk and enabling business strategies in an efficient and effective way fully supported by executive leadership and underpinned by all AXA employees

MISSIONS

  • Red Team Operations: Plan coordinate and execute red team operations to simulate advanced cyber threats targeting our organizations assets infrastructure and personnel.
  • Adversary Emulation: Mimic the tactics techniques and procedures (TTPs) of sophisticated threat actors to identify weaknesses in our security defenses and response capabilities.
  • Penetration Testing: Conduct comprehensive penetration tests to assess the effectiveness of security controls including network application and physical security measures.
  • Vulnerability Research: Identify and exploit vulnerabilities in systems applications and devices to demonstrate potential attack vectors and provide actionable recommendations for mitigation.
  • Tool Development: Develop and customize tools scripts and exploits to support red team operations and enhance the efficiency and effectiveness of simulated attacks.
  • Reporting and Documentation: Document findings including identified vulnerabilities successful attack paths and recommendations for remediation in clear and concise reports for stakeholders provide guidance and priorities for correcting and remediating activities
  • Collaboration and Training: Collaborate with crossfunctional teams including blue teams incident responders and security operations centers (SOCs) to improve detection and response capabilities. Provide training and mentorship to junior team members.
  • Continuous Learning: Stay uptodate with the latest cybersecurity threats attack techniques and defensive strategies. Participate in training conferences and research activities to enhance skills and and assess effectiveness of information security controls across the organization

We bring together the expertise cultural diversity and creativity of over 8000 employees worldwide and were committed to equal opportunities in all aspects of employment (gender LGBT disabled persons or people of different origins) and to promoting Diversity & Inclusion by creating a work environment where all employees are treated with dignity and respect and where individual differences are valued.

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.