Red Team Scenario and Exercise, table top threat simulations specialis
Red Team Scenario and Exercise, table top threat simulations specialist is required for this major financial to scope, execute and facilitate red team table top threat simulations globally to aid in the assessment of control and process effectiveness and gaps discovered along the attack path travelled across protect, monitor and response.
As a Red Team Scenario and Exercise, table top threat simulations specialist you will:
Scope, execute and facilitate red team table top threat simulations globally. Ensure quality and realistic adversarial threat simulations are in line with red team service offerings. Provide executive reports which highlight and clearly articulate identified strengths, gaps and opportunities in a way targeted audience can understand and take prioritised action against. Work with Red Team director in program management and resourcing activities.
Document red team table top findings in a timely, clear and concise manner. Production and delivery of executive reporting to define strengths and development areas in relation to process, capabilities and effectiveness.
Maintain and increase areas of competence to enhance both personal and team capabilities, through well-defined research and development and planned training activities. Build an effective, trusting and reciprocal network of relationships with company partners globally to increase effectiveness of red team services and understanding of business needs.
Increase capabilities of the team through the development and document of tooling and techniques, to increase realism, improve quality, simplify and reduce effort, and to continue progression and development of the red team. Ongoing development of the red team table top threat simulation service offering.
This is a role that requires technical understanding and knowledge, such as modern cyber threat actors, their motivation, scenarios, tools, tactics and procedures but is not a technical hands on role or a role that requires hands on interests You will also be able to differentiate between vulnerability and threat centric approaches.