Robert Half International
Attack & Penetration Offensive Security Tester Manager
Robert Half International, Chicago, Illinois, United States, 60290
Protiviti is looking for an Attack & Penetration Manager to join our growing Technology Consulting team.
**Technical Skills and Talents** Experience conducting red team engagements, demonstrating advanced knowledge of adversarial tactics, techniques, and procedures (TTPs).Ability to emulate sophisticated real-world threat actors, including nation-state-level attackers and advanced persistent threats (APTs). Hands-on experience attacking cloud environments (AWS, Azure, GCP). Demonstrated ability to work collaboratively with defensive teams (SOC/Blue Team) to improve detection, response, and mitigation strategies. Experience working with detection engineering or security analytics teams. Familiarity with attack simulation methodologies (e.g., MITRE ATT&CK framework) to validate security controls and improve system resilience.Practical experience designing and executing ransomware scenarios to evaluate and strengthen an organization’s readiness and incident response. Ability to craft realistic adversarial scenarios based on intelligence about emerging threats tailored to specific industries, technologies, and organizational risks. Experience leveraging threat intelligence to simulate specific adversary groups, their tactics, and their infrastructure.Proficiency in using and customizing offensive security tools such as Havoc, Sliver, and similar frameworks.Experience in building or scripting custom tools and payloads for exploitation, lateral movement, and evasion. Deep knowledge of common attack vectors (e.g., lateral movement, privilege escalation, persistence techniques). Familiarity with network protocols, Active Directory exploitation, cloud attack scenarios, and web application attack techniques. Ability to maintain effective operational security during engagements to avoid detection and maintain stealth.Experience or knowledge of bypassing security measures such as endpoint detection and response (EDR), intrusion detection/prevention systems (IDS/IPS), and other monitoring tools. Proven ability to execute advanced social engineering attacks, including phishing, vishing, and smishing campaigns, tailored to evade detection and successfully achieve engagement objectives.Familiarity with tools and platforms used for managing phishing campaigns (e.g., Evilginx and similar frameworks).Experience conducting reconnaissance-based OSINT (Open-Source Intelligence) to gather information about targets and enhance the effectiveness of social engineering efforts. Ability to evaluate physical security controls (e.g., building access mechanisms, surveillance systems, alarm systems) to identify gaps and simulate breaches.Experience with covert entry techniques, such as lock-picking, bypassing access control systems, RFID cloning, and badge spoofing. Demonstrated ability to execute tailgating, and surveillance operations to test operational security processes. Knowledge of facility security best practices, including implementation of defense-in-depth strategies for physical environments. **Soft Skills** Ability to effectively communicate technical findings and adversarial simulation results to non-technical audiences, including executive leadership. Ability to identify, describe, report and present vulnerabilities, observations and standard remediation activities in comprehensive yet actionable reports, to include clear demonstration of risk to clientele post-engagement.Demonstrated ability to stay ahead of the curve on emerging attack techniques, vulnerabilities, and trends in offensive security. **Additional Skills & Attributes** Ability to work with a diverse portfolio of clients across industries. Proficiency in Python, PowerShell, Bash, or other languages for automation and developing custom offensive security tools.Knowledge of exploit development, malware reverse engineering, or shellcode development. Familiarity with compliance-driven testing frameworks (e.g., PCI DSS, GDPR, or ISO 27001). **Your Educational and Professional Qualifications** Proficiency in Microsoft Office suite applications with specific emphasis on Word, Excel and PowerPoint. Secondary emphasis on Visio and Access.Protiviti practices a hybrid model, which is a combination of working in person with a purpose and working remotely. This model creates meaningful experiences for our people and our clients while offering a flexible environment. The ratio of remote to in-person requirements vary by client, project, team, and other business factors. Our people work both in-person in local Protiviti offices and on client sites, which can include local or out-of-state travel based on our projects and client requests and commitments.
Learn more about the variety of rewards we offer at Protiviti at .Employees are eligible for medical, dental, and vision coverages, FSA and HSA healthcare accounts, life and accident insurance, adoption and fertility assistance, paid parental leave up to 10 weeks, and short/long term disability. We offer eligible employees a company 401(k) savings and investment plan with an employer match of 50% on the first 6% of your contributions. We provide Choice Time Off (CTO) for vacation, personal needs, and sick time. The amount of (CTO) varies based on years of service. New hires receive up to 20 days of CTO per calendar year. Protiviti also recognizes up to 11 paid holidays each calendar year.* The specific accommodation requested to complete the employment application.* The location(s) (city, state) to which you would like to apply. #J-18808-Ljbffr
**Technical Skills and Talents** Experience conducting red team engagements, demonstrating advanced knowledge of adversarial tactics, techniques, and procedures (TTPs).Ability to emulate sophisticated real-world threat actors, including nation-state-level attackers and advanced persistent threats (APTs). Hands-on experience attacking cloud environments (AWS, Azure, GCP). Demonstrated ability to work collaboratively with defensive teams (SOC/Blue Team) to improve detection, response, and mitigation strategies. Experience working with detection engineering or security analytics teams. Familiarity with attack simulation methodologies (e.g., MITRE ATT&CK framework) to validate security controls and improve system resilience.Practical experience designing and executing ransomware scenarios to evaluate and strengthen an organization’s readiness and incident response. Ability to craft realistic adversarial scenarios based on intelligence about emerging threats tailored to specific industries, technologies, and organizational risks. Experience leveraging threat intelligence to simulate specific adversary groups, their tactics, and their infrastructure.Proficiency in using and customizing offensive security tools such as Havoc, Sliver, and similar frameworks.Experience in building or scripting custom tools and payloads for exploitation, lateral movement, and evasion. Deep knowledge of common attack vectors (e.g., lateral movement, privilege escalation, persistence techniques). Familiarity with network protocols, Active Directory exploitation, cloud attack scenarios, and web application attack techniques. Ability to maintain effective operational security during engagements to avoid detection and maintain stealth.Experience or knowledge of bypassing security measures such as endpoint detection and response (EDR), intrusion detection/prevention systems (IDS/IPS), and other monitoring tools. Proven ability to execute advanced social engineering attacks, including phishing, vishing, and smishing campaigns, tailored to evade detection and successfully achieve engagement objectives.Familiarity with tools and platforms used for managing phishing campaigns (e.g., Evilginx and similar frameworks).Experience conducting reconnaissance-based OSINT (Open-Source Intelligence) to gather information about targets and enhance the effectiveness of social engineering efforts. Ability to evaluate physical security controls (e.g., building access mechanisms, surveillance systems, alarm systems) to identify gaps and simulate breaches.Experience with covert entry techniques, such as lock-picking, bypassing access control systems, RFID cloning, and badge spoofing. Demonstrated ability to execute tailgating, and surveillance operations to test operational security processes. Knowledge of facility security best practices, including implementation of defense-in-depth strategies for physical environments. **Soft Skills** Ability to effectively communicate technical findings and adversarial simulation results to non-technical audiences, including executive leadership. Ability to identify, describe, report and present vulnerabilities, observations and standard remediation activities in comprehensive yet actionable reports, to include clear demonstration of risk to clientele post-engagement.Demonstrated ability to stay ahead of the curve on emerging attack techniques, vulnerabilities, and trends in offensive security. **Additional Skills & Attributes** Ability to work with a diverse portfolio of clients across industries. Proficiency in Python, PowerShell, Bash, or other languages for automation and developing custom offensive security tools.Knowledge of exploit development, malware reverse engineering, or shellcode development. Familiarity with compliance-driven testing frameworks (e.g., PCI DSS, GDPR, or ISO 27001). **Your Educational and Professional Qualifications** Proficiency in Microsoft Office suite applications with specific emphasis on Word, Excel and PowerPoint. Secondary emphasis on Visio and Access.Protiviti practices a hybrid model, which is a combination of working in person with a purpose and working remotely. This model creates meaningful experiences for our people and our clients while offering a flexible environment. The ratio of remote to in-person requirements vary by client, project, team, and other business factors. Our people work both in-person in local Protiviti offices and on client sites, which can include local or out-of-state travel based on our projects and client requests and commitments.
Learn more about the variety of rewards we offer at Protiviti at .Employees are eligible for medical, dental, and vision coverages, FSA and HSA healthcare accounts, life and accident insurance, adoption and fertility assistance, paid parental leave up to 10 weeks, and short/long term disability. We offer eligible employees a company 401(k) savings and investment plan with an employer match of 50% on the first 6% of your contributions. We provide Choice Time Off (CTO) for vacation, personal needs, and sick time. The amount of (CTO) varies based on years of service. New hires receive up to 20 days of CTO per calendar year. Protiviti also recognizes up to 11 paid holidays each calendar year.* The specific accommodation requested to complete the employment application.* The location(s) (city, state) to which you would like to apply. #J-18808-Ljbffr