Job Description
Job Title
Red Team Specialist
Job Description
We are seeking a highly skilled and experienced lead specialist to bring our Red Teaming efforts to the next level. This role will be pivotal in building the strategic, operational, and technical framework for a world-class adversarial simulation team. The Red Team, once fully operational, will consist of five full-time employees (FTEs) and will play a critical role in identifying vulnerabilities, testing security controls, and enhancing the organization's overall resilience to cyber threats.
Your role:
Establish a two-year roadmap to develop and operationalize the team, including key milestones and performance indicators.
Develop and implement testing scenarios that simulate advanced cyber threats, including network-based attacks, web application exploits, and malware delivery. This includes Purple teaming exercise to ensure the Security Operations Center gains maximum benefit from testing activities.
Develop standard operating procedures (SOPs), testing methodologies, and attack frameworks aligned with industry standards such as MITRE ATT&CK, NIST, and ISO.
Define and implement processes for planning, executing, and reporting Red Team activities.
Conduct penetration tests, attack simulations, and vulnerability assessments to evaluate the organization’s security defenses.
Simulate real-world threat actor tactics, techniques, and procedures (TTPs) to identify gaps in defenses.
Establish reporting formats and templates for test results, executive summaries, and remediation recommendations.
You're the right fit if:
Bachelor’s degree in Cybersecurity, Computer Science, or related field; or equivalent.
Minimum 5 years of experience with Bachelor's OR Minimum 3 years of experience with Master's in areas such as Security Architecture, Network Security, Cybersecurity Technology, Information Security or equivalent. At least 2 years in offensive security or penetration testing.
Proven experience in establishing or leading a Red Team, penetration testing group, or offensive security program.
Working knowledge of artificial intelligence concepts and practical experience applying AI or machine learning techniques within cybersecurity functions, such as threat analysis, automation, or analytics.
Knowledge of physical security principles, including facility security controls, surveillance systems, and physical penetration testing methods.
Familiarity with employee training evaluation techniques and insider threat mitigation.
In-depth knowledge of adversarial simulation techniques, including social engineering, phishing, and advanced attack techniques.
Familiarity with industry frameworks (e.g., MITRE ATT&CK, NIST, OWASP, ISO 27001).
Strong leadership and project management skills, with the ability to define goals, track progress, and meet deadlines.
Excellent communication skills for delivering technical information to non-technical audiences.
Offensive Security Certified Professional (OSCP), Offensive Security Certified Expert (OSCE), or equivalent
How we work together
We believe that we are better together than apart. For our office-based teams, this means working in-person at least 3 days per week. Onsite roles require full-time presence in the company’s facilities. Field roles are most effectively done outside of the company’s main facilities, generally at the customers’ or suppliers’ locations.
This role is an office role.
About Philips
We are a health technology company. We built our entire company around the belief that every human matters, and we won't stop until everybody everywhere has access to the quality healthcare that we all deserve. Do the work of your life to help the lives of others.
Learn more about our business here.
Discover our rich and exciting history here.
Learn more about our purpose here.
If you're interested in this role and have many, but not all, of the experiences needed, we encourage you to apply. You may still be the right candidate for this or other opportunities at Philips. Learn more about our commitment to diversity and inclusion here.
#LI-EU