MassMutual - New York, NY

posted 5 days ago

Full-time
New York, NY
Insurance Carriers and Related Activities

About the position

The Information Security Consultant - Threat Detection & Adversary Simulation role at MassMutual involves working within the Enterprise Cybersecurity organization to leverage real-world adversarial techniques for penetration testing and simulating attacks on various services. The position focuses on enhancing security operations through threat detection, incident response, and adversary simulation, contributing to the overall security posture of the firm.

Responsibilities

  • Provide technical guidance and hands-on leadership in security operations, focusing on threat detection, adversary simulation, and countermeasure development.
  • Lead threat research, detection, and response efforts, including the development and maintenance of advanced detection content and threat hunting missions.
  • Analyze and synthesize intelligence from various sources to identify risks and provide actionable insights.
  • Oversee and execute adversary simulation exercises (red/purple team) to evaluate and enhance security controls and incident response effectiveness.
  • Research and develop offensive security techniques, tools, and automation frameworks to improve simulation and testing capabilities.
  • Advise on threat mitigation strategies for emerging threats and vulnerabilities.
  • Lead and support incident response engagements and provide expert advisory on scoping, containment, and eradication strategies.

Requirements

  • Bachelor's degree
  • 8+ years of experience in information security, focusing on threat detection, incident response, adversary simulation (red and purple teaming) and/or relative experience.

Nice-to-haves

  • Degree in Cyber Security, Computer Science, or Criminal Justice with a focus in Cyber Security
  • 10+ years of experience in information security, focusing on threat detection, incident response, and adversary simulation (red and purple teaming).
  • Proven ability to lead and develop threat hunting, detection engineering, and offensive security programs.
  • Expertise in developing advanced threat detection rules, both signature-based and behavior-based analytics.
  • Hands-on experience with offensive security tools such as CobaltStrike, Mythic, Evilginx, Outflank C2, and OST.
  • Proficient in multiple programming languages including Python, C#, C/C++ and GoLang and familiarity with Windows/MacOS internals.
  • Proficient in infrastructure automation using Terraform, Ansible, and CloudFormation.
  • Proficient with SIEM and EDR platforms, including but not limited to Splunk, SumoLogic, and CrowdStrike Falcon EDR/LogScale.
  • Strong understanding of identity management platforms like Okta, Microsoft EntraID, and Active Directory, including identity-based attacks.
  • Security automation expertise using Python scripting, Palo Alto Cortex XSOAR, and GitOps practices.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service