North Carolina Staffing
Cybersecurity Senior Engineer (BAS)
North Carolina Staffing, Raleigh, North Carolina, United States, 27601
Cybersecurity Senior Engineer (Breach And Attack Simulation)
The Cybersecurity Senior Engineer (Breach and Attack Simulation) is responsible for designing, implementing, and maturing advanced security validation capabilities to safeguard enterprise systems and applications. This role focuses on continuous security validation through Breach and Attack Simulation (BAS) tools, integration with existing security infrastructure, and providing actionable insights to strengthen the firm's cyber resilience. The engineer partners with cross-functional teams to simulate real-world adversarial tactics, techniques, and procedures (TTPs), evaluate control effectiveness, and recommend enhancements that align with enterprise risk management and regulatory standards. Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time: Design and execute BAS scenarios: Plan and conduct realistic cyberattack simulations that mirror real-world threat actor TTPs across enterprise environments. Analyze simulation results: Assess BAS outcomes to identify security control gaps, vulnerabilities, and opportunities for improved detection and response. Provide actionable recommendations: Develop and communicate prioritized recommendations to strengthen security policies, procedures, and technical controls. Collaborate across teams: Work with red, blue, and purple teams, as well as incident response and threat intelligence groups, to adjust alerts, rules, and detection logic. Threat hunting and intelligence: Leverage threat intelligence to inform BAS scenarios and proactively address emerging threats. Vulnerability management support: Contribute to the identification, prioritization, and remediation of vulnerabilities based on simulation and testing results. Documentation and reporting: Maintain detailed documentation of BAS methodologies, procedures, and findings; communicate technical results clearly to both technical and non-technical stakeholders. Required Qualifications
Required Qualifications: Bachelor's degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience In-depth knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security Preferred Qualifications
Preferred Qualifications: Experience with Breach and Attack (BAS) or Continuous Security Validation (CSV) tool(s) Bachelor's degree and twelve years of experience or an equivalent combination of education and work experience Banking or financial services experience Strong understanding of cybersecurity concepts, including attack vectors, TTPs, and security controls. Hands-on experience with architecting, maturing, and automation - CI/CD pipeline end to end lifecycle Experience with penetration testing, vulnerability management, and security tools. Proficiency in scripting and automation languages (e.g., Python, PowerShell). Knowledge of common threat intelligence sources and frameworks. Excellent analytical, problem-solving, and communication skills. Ability to work independently and as part of a team. Experience with cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK and D3FEND). Experience with GRC engineering Experience with commercial BAS tools: AttackIQ, SafeBreach, Cymulate, etc. Experience with detection engineering and SOAR Other Job Requirements / Working Conditions
Sitting Constantly (More than 50% of the time) Visual / Audio / Speaking Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone. Manual Dexterity / Keyboarding Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers. Availability Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need. Travel Minimal and up to 10%
The Cybersecurity Senior Engineer (Breach and Attack Simulation) is responsible for designing, implementing, and maturing advanced security validation capabilities to safeguard enterprise systems and applications. This role focuses on continuous security validation through Breach and Attack Simulation (BAS) tools, integration with existing security infrastructure, and providing actionable insights to strengthen the firm's cyber resilience. The engineer partners with cross-functional teams to simulate real-world adversarial tactics, techniques, and procedures (TTPs), evaluate control effectiveness, and recommend enhancements that align with enterprise risk management and regulatory standards. Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time: Design and execute BAS scenarios: Plan and conduct realistic cyberattack simulations that mirror real-world threat actor TTPs across enterprise environments. Analyze simulation results: Assess BAS outcomes to identify security control gaps, vulnerabilities, and opportunities for improved detection and response. Provide actionable recommendations: Develop and communicate prioritized recommendations to strengthen security policies, procedures, and technical controls. Collaborate across teams: Work with red, blue, and purple teams, as well as incident response and threat intelligence groups, to adjust alerts, rules, and detection logic. Threat hunting and intelligence: Leverage threat intelligence to inform BAS scenarios and proactively address emerging threats. Vulnerability management support: Contribute to the identification, prioritization, and remediation of vulnerabilities based on simulation and testing results. Documentation and reporting: Maintain detailed documentation of BAS methodologies, procedures, and findings; communicate technical results clearly to both technical and non-technical stakeholders. Required Qualifications
Required Qualifications: Bachelor's degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience In-depth knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security Preferred Qualifications
Preferred Qualifications: Experience with Breach and Attack (BAS) or Continuous Security Validation (CSV) tool(s) Bachelor's degree and twelve years of experience or an equivalent combination of education and work experience Banking or financial services experience Strong understanding of cybersecurity concepts, including attack vectors, TTPs, and security controls. Hands-on experience with architecting, maturing, and automation - CI/CD pipeline end to end lifecycle Experience with penetration testing, vulnerability management, and security tools. Proficiency in scripting and automation languages (e.g., Python, PowerShell). Knowledge of common threat intelligence sources and frameworks. Excellent analytical, problem-solving, and communication skills. Ability to work independently and as part of a team. Experience with cybersecurity frameworks and standards (e.g., NIST, MITRE ATT&CK and D3FEND). Experience with GRC engineering Experience with commercial BAS tools: AttackIQ, SafeBreach, Cymulate, etc. Experience with detection engineering and SOAR Other Job Requirements / Working Conditions
Sitting Constantly (More than 50% of the time) Visual / Audio / Speaking Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone. Manual Dexterity / Keyboarding Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers. Availability Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need. Travel Minimal and up to 10%