MassMutual Offensive Security Analyst in Helena, Montana
Why we need you.
We’re growing and our clients deserve the best. As an Offensive Security Analyst you will have the opportunity to work in a thriving and robust environment in the specialty areas of exploitation assessment and vulnerability & assessment management. You will do so by partnering closely with our Security Intelligence and Threat and Vulnerability Assessment (TVA) teams. You will leverage real and current adversarial techniques against our own network based on the latest threats in red team and purple team assessments! In this role, as well as all roles within MassMutual, you will demonstrate accountability, agility, a dedication to be inclusive, a strong business acumen, and will show courage, even in the most difficult situations. We also highly value strong communication skills, a passion for learning, leadership traits, resilience and self-awareness.
Does this role sound like what you are looking for? Do you believe you would be a great fit?
Below are the lists of tasks candidates will be able to perform, knowledge you should have, and skills & abilities that you can bring into our Offensive Security Analyst role!
Identify vulnerabilities and exposure within enterprise networks, systems, and applications
Lead or enable exploitation operations in support of organization objectives and target requirements
Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).
Provide recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g. protection of information, systems and processes).
Provide technical documents, incident reports, video recorded descriptions, findings from computer examinations, summaries, and other situational awareness information to relevant stakeholders
Conduct and/or support authorized penetration testing on enterprise network assets.
Perform penetration testing as required for new or updated applications.
Review the security status of a system (including the effectiveness of security controls) on an ongoing basis to determine whether the risk remains acceptable.
Provide recommendations for how to improve the controls based on test scenario findings
Create and conduct custom table top exercises
Partner with other teams on alert development to create new alerts and identify gaps in alerting.
Analyze Threat Trends to identify indicators of compromise (IOCs)
Develop your own test scenarios by performing threat hunts and ethical hack tests
Identify control gaps that allow threats to enter our network
Design and develop new tools/technologies as related to cybersecurity.
Develop specific cybersecurity countermeasures and risk mitigation strategies for systems and/or applications.
Exploit network devices, security devices, and/or terminals or environments using various methods or tools.
Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.
Test and evaluate locally developed tools for operational use.
Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities.
Perform analysis for target infrastructure exploitation activities.
Conduct exploitation of wireless computer and digital networks.
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
Data compromise/destruction, covert communications, encryption attacks and more
Detection Engineering framework
Understanding of cloud technologies
Understanding of the cybersecurity external landscape
Functions and capabilities of internal teams that emulate threat activities to benefit the organization.
Ethical hacking principles and techniques.
Cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
Attack methods and techniques (DDoS, brute force, spoofing, etc.).
Adversarial tactics, techniques, and procedures.
Hunting in response to an incident
Providing Offensive security as a service simultaneously to multiple customers
Identifying gaps in technical capabilities.
Researching vulnerabilities and exploits utilized in traffic.
Writing (and submitting) requirements to meet gaps in technical capabilities
Use of penetration testing tools and techniques
Performing impact/risk assessments.
Supporting clients in consulting engagement model
Think like an adversary
Learn multiple network infrastructures
Support client in a consulting engagement model
Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means
Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
Evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
Identify/describe target vulnerability.
Identify/describe techniques/methods for conducting technical exploitation of the target.
Identify systemic security issues based on the analysis of vulnerability and configuration data.
- GCDA or GCPN or OSCP or GXPN certified.
Target job salary: $102,800.00 - $178,800.00 USD Annual
MassMutual is an Equal Employment Opportunity employer Minority/Female/Sexual Orientation/Gender Identity/Individual with Disability/Protected Veteran. We welcome all persons to apply. Note: Veterans are welcome to apply, regardless of their discharge status.
If you need an accommodation to complete the application process, please contact us (firstname.lastname@example.org) and share the specifics of the assistance you need.