#R16693
on threat detection, adversary simulation, and countermeasure development.
Lead threat research, detection, and response efforts, including the development and maintenance of advanced detection content and threat hunting missions.
Analyze and synthesize intelligence from various sources to identify risks and provide actionable insights.
Oversee and execute adversary simulation exercises (red/purple team) to evaluate and enhance security controls and incident response effectiveness.
Research and develop offensive security techniques, tools, and automation frameworks to improve simulation and testing capabilities.
Advise on threat mitigation strategies for emerging threats and vulnerabilities.
Lead and support incident response engagements and provide expert advisory on scoping, containment, and eradication strategies.
The Minimum Qualifications
Bachelors degree
8+ years of experience in information security, focusing on threat detection, incident response, adversary simulation (red and purple teaming) and/or relative experience
The Ideal Qualifications:
Degree in Cyber Security, Computer Science, or Criminal Justice with a focus in Cyber Security
10+ years of experience in information security, focusing on threat detection, incident response, and adversary simulation (red and purple teaming).
Proven ability to lead and develop threat hunting, detection engineering, and offensive security programs.
Expertise in developing advanced threat detection rules, both signature-based and behavior-based analytics.
Hands-on experience with offensive security tools such as CobaltStrike, Mythic, Evilginx, Outflank C2, and OST.
Proficient in multiple programming languages including Python, C#, C/C++ and GoLang and familiarity with Windows/MacOS internals.
Proficient in infrastructure automation using Terraform, Ansible, and CloudFormation.
Proficient with SIEM and EDR platforms, including but not limited to Splunk, SumoLogic, and CrowdStrike Falcon EDR/LogScale.
Strong understanding of identity management platforms like Okta, Microsoft EntraID, and Active Directory, including identity-based attacks.
Security automation expertise using Python scripting, Palo Alto Cortex XSOAR, and GitOps practices.
Preferred Certifications:
Offensive Security Certified Professional (OSCP)
Certified Red Team Operator (CRTO)
GIAC Certified Cloud Forensics Responder (GCFR)
GIAC Certified Forensics Analyst (GCFA)
Certified Red Team Leader (CRTL)
#LI-RK1
MassMutual is an Equal Employment Opportunity employer Minority/Female/Sexual Orientation/Gender Identity/Individual with Disability/Protected Veteran. We welcome all persons to apply. Note: Veterans are welcome to apply, regardless of their discharge status.
If you need an accommodation to complete the application process, please contact us and share the specifics of the assistance you need.
EEO Statement (Opens in new window)
MassMutual will accept applications on an ongoing basis until such time as a candidate has been offered employment. The job description includes the main duties of this position, which may evolve over time. You may be required to perform other duties not listed.
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment.
Salary Range: $131,100.00-$172,000.00