- Company Name
- Intact
- Job Title
- Spécialiste en Sécurité - Sécurité offensive (Équipe rouge mondiale)
- Job Description
-
**Job Title**
Offensive Security Specialist – Global Red Team
**Role Summary**
Conduct offensive security assessments across all Intact affiliates worldwide. Apply advanced attack techniques to test, validate, and strengthen security controls, network defenses, and incident‑response capabilities. Deliver actionable findings and metrics to improve organizational security posture.
**Expectations**
- Deliver rigorous, peer‑reviewed penetration tests on schedule.
- Maintain professional engagement discipline and adhere to engagement rules.
- Communicate clearly with technical and non‑technical stakeholders, including CISO, risk, and governance teams.
- Continuously update tools and methodologies to match evolving threat tactics.
**Key Responsibilities**
- Perform network reconnaissance using industry‑standard tools, threat‑intel feeds, OSINT, and other publicly available sources.
- Design and execute targeted red‑team exercises that simulate real threat‑actor behavior across corporate networks, cloud, and application layers.
- Bypass modern EDR/ATP solutions (CrowdStrike, MDE, SentinelOne) and demonstrate privilege escalation, lateral movement, and data exfiltration techniques.
- Analyze and report on findings, recommending clear remediation, hardening, and improvement actions.
- Collaborate with regional cyber‑governance and risk teams to ensure timely remediation tracking.
- Generate KPI reports and metrics for the CISO and senior leadership on control effectiveness.
- Evaluate emerging threats to the financial‑services sector and benchmark regional results against peers.
- Consume threat‑intel data, map attack surfaces, and establish actionable rules for testing engagements.
- Keep all offensive security tools, scripts, and processes current and compliant with internal rules of engagement.
- Provide timely, concise communication to stakeholders throughout all testing phases.
**Required Skills**
- Deep knowledge of TCP/IP, DNS, UDP, BGP, and routing tables.
- Proficiency in exploitation and privilege‑escalation techniques on Windows, Linux, and network devices.
- Advanced use of penetration‑testing frameworks (Kali Linux, Metasploit, Cobalt Strike, etc.).
- Ability to evade and defeat EDR/ATP protections (CrowdStrike, MDE, SentinelOne).
- Expertise in threat‑intel parsing, vulnerability assessment, and attack‑surface analysis.
- Solid understanding of SOC, SIEM, IAM, DLP, and incident‑response operations.
- Strong technical documentation, reporting, and presentation skills.
- Excellent collaboration across time zones and functional teams.
**Required Education & Certifications**
- Bachelor’s degree in Computer Science, Information Technology, Information Security or related field (or equivalent experience).
- Minimum 5 years of professional IT experience, 3 years in information‑security roles.
- Hands‑on experience in offensive security operations.
- Certifications preferred: OSCP, CEH, GCIA, GPEN, or equivalent.
- Knowledge of applicable regulatory standards (PCI‑DSS, ISO 27001, NIST, etc.) is a plus.