Software Guidance & Assistance, Inc. (SGA, Inc.)
Sr Cyber Security Engineer –Threat Simulation
Software Guidance & Assistance, Inc. (SGA, Inc.), Chicago, Illinois, United States, 60290
Sr Cyber Security Engineer – Threat Simulation
Software Guidance & Assistance, Inc. (SGA, Inc.) is searching for a Sr Cyber Security Engineer for a full‑time assignment with one of our premier Financial Clients in Chicago, IL.
Pay range: $160,000 – $180,000 per year.
Join our client’s Global Information Security (GIS) department as a Sr. Cyber Security Engineer – Threat Simulation. You will be an integral part of our Offensive Security organization, directly contributing to improving security posture. This high‑impact role is responsible for the execution of Red Team adversary emulations against our complex hybrid environment, proactively testing and strengthening our internal and internet‑facing systems.
You’ll also be a key participant in Purple Team activities to continuously improve the organization’s cyber detection and response capabilities. This is a perfect opportunity for a sharp, action‑oriented engineer to become a key part of a team of highly skilled cybersecurity professionals who execute a pivotal role in protecting and defending national critical infrastructure.
Responsibilities
Execute high‑impact Red Team exercises against our complex hybrid cloud environments, driven by real‑world threat intelligence and the MITRE ATT&CK framework.
Engineer and maintain robust Red and Purple Team infrastructure, continuously automating processes for efficiency and scale.
Co‑design and lead joint Purple Team exercises, directly partnering with cyber defense to improve detection and response capabilities.
Innovate through continuous research into new offensive security TTPs (Tactics, Techniques, and Procedures) and drive knowledge transfer across the security organization.
Conduct specialized, ad‑hoc offensive security tests utilizing industry‑leading and internally developed tooling to uncover subtle Security gaps.
Author comprehensive post‑exercise reports, including detailed technical findings, Compromise narratives, and strategic, risk‑rated recommendations for remediation.
Mentor Cyber Defense teams during Incident investigations, providing critical subject‑matter expertise on attacker tradecraft and mindset.
Champion security awareness and technical knowledge‑sharing by collaborating with information security, Technology, and business stakeholders.
Required Skills
Robust offensive mindset with a proven track record of breaking and building in complex enterprise environments.
5+ years’ experience wielding industry‑standard penetration testing and adversary emulation tools (e.g., Cobalt Strike, Sliver, Mythic, Bloodhound, Burp Suite).
Expert understanding of the MITRE ATT&CK framework and advanced evasion techniques used to bypass modern security controls.
Strong comprehension of the Cyber Kill Chain and the full lifecycle of an Advanced Persistent Threat (APT) targeting financial institutions.
Proficiency in at least one scripting language (e.g., Python, PowerShell) and experience with a compiled language (e.g., Go, C#) for tool development.
Deep experience attacking and securing complex cloud, on‑prem, and hybrid environments, from initial access through actions on objective.
Solid Knowledge of Windows and Linux System hardening concepts, Purple Team automation strategies, and vulnerability rating methodologies.
Proven Experience with Security within at least one major cloud provider (e.g., AWS, Azure, GCP).
Preferred Skills
Previous hands‑on experience performing sophisticated adversary emulations/simulations specifically within the Financial Services sector.
A recognized offensive security industry certification (e.g., OSCP, GPEN, GXPN, OSWE, eCPTX) demonstrating specialized, high‑impact skills.
Familiarity with modern enterprise security standards and frameworks (e.g., NIST CSF, ISO 27001, CIS Controls).
Experience conducting offensive security exercises against emerging technologies such as AI/ML systems or macOS.
SGA is an Equal Opportunity Employer and does not discriminate on the basis of race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, age, marital status, pregnancy, genetic information, or any other legally protected status. We are committed to providing access, equal opportunity, and reasonable accommodation for individuals with disabilities in employment, and our Services, Programs, and Activities. Please visit our EEO page to request an accommodation or assistance regarding our policy.
#J-18808-Ljbffr
Pay range: $160,000 – $180,000 per year.
Join our client’s Global Information Security (GIS) department as a Sr. Cyber Security Engineer – Threat Simulation. You will be an integral part of our Offensive Security organization, directly contributing to improving security posture. This high‑impact role is responsible for the execution of Red Team adversary emulations against our complex hybrid environment, proactively testing and strengthening our internal and internet‑facing systems.
You’ll also be a key participant in Purple Team activities to continuously improve the organization’s cyber detection and response capabilities. This is a perfect opportunity for a sharp, action‑oriented engineer to become a key part of a team of highly skilled cybersecurity professionals who execute a pivotal role in protecting and defending national critical infrastructure.
Responsibilities
Execute high‑impact Red Team exercises against our complex hybrid cloud environments, driven by real‑world threat intelligence and the MITRE ATT&CK framework.
Engineer and maintain robust Red and Purple Team infrastructure, continuously automating processes for efficiency and scale.
Co‑design and lead joint Purple Team exercises, directly partnering with cyber defense to improve detection and response capabilities.
Innovate through continuous research into new offensive security TTPs (Tactics, Techniques, and Procedures) and drive knowledge transfer across the security organization.
Conduct specialized, ad‑hoc offensive security tests utilizing industry‑leading and internally developed tooling to uncover subtle Security gaps.
Author comprehensive post‑exercise reports, including detailed technical findings, Compromise narratives, and strategic, risk‑rated recommendations for remediation.
Mentor Cyber Defense teams during Incident investigations, providing critical subject‑matter expertise on attacker tradecraft and mindset.
Champion security awareness and technical knowledge‑sharing by collaborating with information security, Technology, and business stakeholders.
Required Skills
Robust offensive mindset with a proven track record of breaking and building in complex enterprise environments.
5+ years’ experience wielding industry‑standard penetration testing and adversary emulation tools (e.g., Cobalt Strike, Sliver, Mythic, Bloodhound, Burp Suite).
Expert understanding of the MITRE ATT&CK framework and advanced evasion techniques used to bypass modern security controls.
Strong comprehension of the Cyber Kill Chain and the full lifecycle of an Advanced Persistent Threat (APT) targeting financial institutions.
Proficiency in at least one scripting language (e.g., Python, PowerShell) and experience with a compiled language (e.g., Go, C#) for tool development.
Deep experience attacking and securing complex cloud, on‑prem, and hybrid environments, from initial access through actions on objective.
Solid Knowledge of Windows and Linux System hardening concepts, Purple Team automation strategies, and vulnerability rating methodologies.
Proven Experience with Security within at least one major cloud provider (e.g., AWS, Azure, GCP).
Preferred Skills
Previous hands‑on experience performing sophisticated adversary emulations/simulations specifically within the Financial Services sector.
A recognized offensive security industry certification (e.g., OSCP, GPEN, GXPN, OSWE, eCPTX) demonstrating specialized, high‑impact skills.
Familiarity with modern enterprise security standards and frameworks (e.g., NIST CSF, ISO 27001, CIS Controls).
Experience conducting offensive security exercises against emerging technologies such as AI/ML systems or macOS.
SGA is an Equal Opportunity Employer and does not discriminate on the basis of race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, age, marital status, pregnancy, genetic information, or any other legally protected status. We are committed to providing access, equal opportunity, and reasonable accommodation for individuals with disabilities in employment, and our Services, Programs, and Activities. Please visit our EEO page to request an accommodation or assistance regarding our policy.
#J-18808-Ljbffr