Loading ...
Loading ...
Adversary Emulation Engineer
Visualizza: 160
Giorno di aggiornamento: 25-11-2025
Categoria: IT - Software IT - Hardware / Reti Tecnologie dell’informazione
Industria:
Loading ...
Contenuto del lavoro
Adversary Emulation Engineer
Working Location:Mons, Belgium
- Security Clearance: NATO Secret
- Language:High proficiency level in English language
EXPERIENCE AND EDUCATION:
Essential Qualifications/Experience:
· 3+ years post-related experience
· Proven experience in either penetration testing, red teaming or adversary emulation for at least 3 years
· Understanding of the principles of adversary emulation (red/purple teaming)
· Ability to develop and execute adversary emulation scenarios
· Understanding of tactics, techniques and procedures of threat actors based on MITRE ATT&CK Framework
· Ability to create and execute custom scripts to simulate attack activities
· Understanding of the various types of detections available (defence in depth)
· Knowledge of the latest security trends and best practices
· Ability to create and use custom tools to automate and optimize the adversary emulation process
· Knowledge of the principles of IT security, risk and compliance
· Experience with security testing tools and methodologies, such as fuzzing, static and dynamic application security testing, and penetration testing
· Knowledge in system and network administration of UNIX and Windows systems
· Use of penetration testing tools, techniques, and recognized testing methodologies
· Scripting skills in Python
· Technical knowledge in system and network security, authentication and security protocols, cryptography and application security
· Ability to evaluate risks and formulate mitigation plans
· Proven ability to write clear and structured technical reports including executive summary, technical findings and remediation plan for several different audiences
DUTIES/ROLE:
· Lead and/or be part of the Red/Purple Team during assessments
· Develop and execute complex adversary emulation scenarios
· Create custom scripts in python to simulate attack activities
· Utilize detections to improve the effectiveness of adversary emulation scenarios
· Create and use custom tools to automate and optimize the adversary emulation process
· Provide security design reviews to ensure compliance with company policies and directives
· Provide security consultancy and advice to projects, plans, and other entities
· Brief at both executive and technical levels on security reports and testing outcome
· Ensure proactive collaboration and coordination with internal and external stakeholders
· Ensure compliance with IT security, risk and compliance principles
· Responds to ad-hoc tasks given by the chain of command
Deliverables:
· Provide an average of 139 hours/month working on-site, embedded in the NCSC Penetration Testing and Adversary Emulation Cell located in SHAPE, Casteau, Belgium
· High-quality reports on the results of adversary emulation assessments as directed by Lead Engineer NCSC
· Provide variety of deliverables associated to any duty (described in above)
· Provide accurate and complete deliverables in accordance with internal processes
· Responsible for complying with all applicable local employment laws, in addition to following all SHAPE & NCIA on boarding procedures. Delivery of the service cannot begin until these requirements are fulfilled
· Each provider of this service must pass an assessment to demonstrate proficiency before being approved to provide the service. The assessment will follow a brief familiarisation period
· Shall not be required to work on NCIA holidays
· Proven experience in either penetration testing, red teaming or adversary emulation for at least 3 years
· Understanding of the principles of adversary emulation (red/purple teaming)
· Ability to develop and execute adversary emulation scenarios
· Understanding of tactics, techniques and procedures of threat actors based on MITRE ATT&CK Framework
· Ability to create and execute custom scripts to simulate attack activities
· Understanding of the various types of detections available (defence in depth)
· Knowledge of the latest security trends and best practices
· Ability to create and use custom tools to automate and optimize the adversary emulation process
· Knowledge of the principles of IT security, risk and compliance
· Experience with security testing tools and methodologies, such as fuzzing, static and dynamic application security testing, and penetration testing
· Knowledge in system and network administration of UNIX and Windows systems
· Use of penetration testing tools, techniques, and recognized testing methodologies
· Scripting skills in Python
· Technical knowledge in system and network security, authentication and security protocols, cryptography and application security
· Ability to evaluate risks and formulate mitigation plans
· Proven ability to write clear and structured technical reports including executive summary, technical findings and remediation plan for several different audiences
DUTIES/ROLE:
· Lead and/or be part of the Red/Purple Team during assessments
· Develop and execute complex adversary emulation scenarios
· Create custom scripts in python to simulate attack activities
· Utilize detections to improve the effectiveness of adversary emulation scenarios
· Create and use custom tools to automate and optimize the adversary emulation process
· Provide security design reviews to ensure compliance with company policies and directives
· Provide security consultancy and advice to projects, plans, and other entities
· Brief at both executive and technical levels on security reports and testing outcome
· Ensure proactive collaboration and coordination with internal and external stakeholders
· Ensure compliance with IT security, risk and compliance principles
· Responds to ad-hoc tasks given by the chain of command
Deliverables:
· Provide an average of 139 hours/month working on-site, embedded in the NCSC Penetration Testing and Adversary Emulation Cell located in SHAPE, Casteau, Belgium
· High-quality reports on the results of adversary emulation assessments as directed by Lead Engineer NCSC
· Provide variety of deliverables associated to any duty (described in above)
· Provide accurate and complete deliverables in accordance with internal processes
· Responsible for complying with all applicable local employment laws, in addition to following all SHAPE & NCIA on boarding procedures. Delivery of the service cannot begin until these requirements are fulfilled
· Each provider of this service must pass an assessment to demonstrate proficiency before being approved to provide the service. The assessment will follow a brief familiarisation period
· Shall not be required to work on NCIA holidays
Loading ...
Loading ...
Scadenza: 09-01-2026
Clicca per candidarti per un candidato gratuito
Segnala lavoro
Loading ...
LAVORI SIMILI
-
⏰ 18-12-2025🌏 Mons, Hainaut
-
⏰ 17-12-2025🌏 Mons, Hainaut
-
⏰ 18-12-2025🌏 Mons, Hainaut
-
⏰ 18-12-2025🌏 Chièvres, Hainaut
Loading ...
-
⏰ 23-12-2025🌏 Ath, Hainaut
-
⏰ 19-12-2025🌏 Mons, Hainaut
-
⏰ 22-12-2025🌏 Ath, Hainaut
-
⏰ 02-01-2026🌏 Tournai, Hainaut
Loading ...
-
⏰ 19-12-2025🌏 Mons, Hainaut
-
⏰ 17-12-2025🌏 Binche, Hainaut