This job is no longer available

The job listing you are looking has expired.
Please browse our latest remote jobs.

See open jobs →
← Back to all jobs

Senior Principal, Adversary Services

Added
23 days ago
Type
Full time
Salary
$228K - $258K

Use AI to Automatically Apply!

Let your AI Job Copilot auto-fill application questions
Auto-apply to relevant jobs from 300,000 companies

Auto-apply with JobCopilot Apply manually instead
Save job
About Coalfire

Coalfire is on a mission to make the world a safer place by solving our clients’ hardest cybersecurity challenges. We work at the cutting edge of technology to advise, assess, automate, and ultimately help companies navigate the ever-changing cybersecurity landscape. We are headquartered in Chicago, Illinois with offices across the U.S. and U.K., and we support clients around the world.

But that’s not who we are – that’s just what we do.
 
We are thought leaders, consultants, and cybersecurity experts, but above all else, we are a team of passionate problem-solvers who are hungry to learn, grow, and make a difference.

Position Summary
We are looking for an exceptionally skilled and experienced Senior/Principal Consultant to join our team. You will join our Adversary Services team (Red Team) in helping our clients identify and mitigate gaps in detection and response, identify novel vulnerabilities and misconfigurations that lead to further compromise, and emulate real-world threat actor tactics, techniques, and procedures (TTPs). You will play a critical role in shaping our capabilities and ensuring that the Adversary Services team is recognized as one of the leading teams in the offensive security industry.

What You'll Do

  • Provide expertise in adversary services, working in detection and response evasion, creation of novel tactics and exploits, emulation of threat actor TTPs, and the evolution of sophisticated command and control (C2) infrastructure.
  • Develop and execute on sophisticated offensive cybersecurity tradecraft to gain initial access, establish persistence, escalate privileges, move laterally, and evade detection and response controls.
  • Execute on adversary simulation, adversary emulation, and purple team exercises.
  • Lead prolonged, holistic, engagements of our clients’ systems and applications, identifying and prioritizing security risks, detection gaps, and recommending appropriate remediation measures, with reporting aligned to MITRE ATT&CK and other relevant frameworks.
  • Develop and maintain custom exploit code, scripts, and tools to automate and streamline adversary services activities.
  • Stay current with emerging security threats and trends, and proactively identify areas of improvement to enhance our security posture.
  • Act as a trusted advisor to our clients on security matters, providing insights and recommendations to inform strategic decision-making.

What You'll Bring

  • 8+ years of experience in penetration testing, adversary services/red teaming, and purple teaming, with a minimum of 5+ years leading covert Red Team engagements.
  • Significant experience creating and delivering specialized testing and training for internal stakeholders and customers on the latest threat actor TTPs and capabilities, including advanced persistent threats (APTs), ransomware, and insider threats.
  • Experience presenting thought leadership, including talks at security conferences, blogs, or in other forums.
  • Deep technical expertise in adversary services-related tradecraft, including development and management of command and control infrastructure, custom development of leading C2 toolsets (e.g. Cobalt Strike, Sliver, Mythic), and stewardship of evasion techniques to maximize effectiveness.
  • Extensive experience conducting adversary services engagements across a variety of platforms and environments, including on-premise, cloud, and hybrid environments.
  • Relevant certifications such as CRTO, CRTO II, AT:RTO, OSEP, or related.
  • Excellent communication and collaboration skills, with the ability to effectively convey complex technical concepts to both technical and non-technical audiences.
  • Experience in all components of the attack chain, including OSINT, social engineering (phishing, vishing, smishing), payloads, C2 infrastructure, lateral movement, privilege escalation, and impact objectives.
  • Technical knowledge of programming and scripting languages (e.g. Python, Ruby, Go) to develop and modify custom evasion tooling and infrastructure.
  • Ability to thrive in a fast-paced, dynamic environment, and adapt quickly to changing priorities and requirements.
  • Ability to foster a positive work environment and attitude, with a “team first” mentality.

Salary
The salary range listed is a reasonable estimate of the compensation range for this role based on national salary averages. The actual salary offer to the successful candidate will be based on job-related education, geographic location, training, licensure and certifications and other factors. You may also be eligible to participate in annual incentive, commission, and/or recognition programs.

Use AI to Automatically Apply!

Let your AI Job Copilot auto-fill application questions
Auto-apply to relevant jobs from 300,000 companies

Auto-apply with JobCopilot Apply manually instead
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Remote Engineering Jobs. Just set your preferences and Job Copilot will do the rest—finding, filtering, and applying while you focus on what matters.

Related Engineering Jobs

See more Engineering jobs →