
Security Engineer
3 weeks ago
Role Overview
We are seeking a highly skilled Security Engineer with expertise in threat simulation, the MITRE ATT&CK framework, and scripting. The ideal candidate will have a strong background in penetration testing, red teaming, or threat emulation, along with hands-on experience in BAS (Breach and Attack Simulation) tools. The role involves evaluating security posture, simulating real-world attack scenarios, and collaborating with SOC, threat intelligence, and automation teams to strengthen defenses.
Key Responsibilities
- Design, execute, and manage threat simulations aligned with the MITRE ATT&CK framework.
- Conduct penetration testing, red team exercises, and threat emulation to identify vulnerabilities.
- Utilize BAS tools (SafeBreach, AttackIQ, Cymulate, Picus, XM Cyber, Pentera, ThreatSimulator, Verodin) for continuous security validation.
- Develop and maintain custom attack scenarios using scripting languages (Python, PowerShell, Bash, etc.).
- Collaborate with SOC teams to enhance incident detection and response capabilities.
- Integrate BAS outputs with threat intelligence feeds and security automation platforms.
- Provide actionable remediation guidance to improve security control effectiveness.
- Create technical reports and present findings to both technical and non-technical stakeholders.
Required Skills & Qualifications
- Strong knowledge of threat simulation methodologies and the MITRE ATT&CK framework.
- Proven experience in penetration testing, red teaming, or threat emulation.
- Hands-on experience with BAS platforms such as SafeBreach, AttackIQ, Cymulate, Picus, XM Cyber, Pentera, ThreatSimulator, or Verodin.
- Proficiency in scripting languages (Python, PowerShell, Bash, etc.).
- Familiarity with SOC operations, threat intelligence workflows, and security automation.
- Solid understanding of network protocols, endpoints, cloud environments, and security controls.
- Industry certifications preferred (OSCP, CRTO, CEH, GPEN, GCTI, etc.).
Preferred Qualifications
- Experience integrating BAS tools with SIEM/SOAR platforms.
- Knowledge of hybrid and cloud security architectures.
- Exposure to advanced persistent threat (APT) simulations and purple teaming exercises.Role & responsibilities
Preferred candidate profile
-
Security Engineer L3
1 week ago
Gurugram, India Rackspace Full timeRackspace Cyber Defense Security Engineer L3 (Cloud Security) About Rackspace Cyber Defense Rackspace Cyber Defense is our next generation cyber defense and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services. Our purpose is...
-
Security Engineer L3
1 week ago
Gurugram, India Rackspace Full timeRackspace Cyber Defense Security Engineer L3 (Cloud Security) About Rackspace Cyber Defense Rackspace Cyber Defense is our next generation cyber defense and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services. Our purpose is to...
-
Security Operations Engineer
3 weeks ago
Gurugram, India Simpplr Full timeWho We AreSimpplr is the AI-powered platform that unifies the digital workplace – bringing together engagement, enablement, and services to transform the employee experience. It streamlines communication, simplifies interactions, automates workflows, and elevates the everyday experience of work. The platform is intuitive, highly extensible, and built to...
-
Security Engineer
1 week ago
Gurugram, India Syfe Full timeAbout Syfe Syfe is a digital investment platform with a mission to empower people to build their wealth for a better future. Faced with information overload and competing priorities, people with the desire to improve their wealth and financial future lack the time, patience and know-how to put their money to work. Current solutions fail to solve the...
-
Security Engineer
1 week ago
Gurugram, India Syfe Full timeAbout Syfe Syfe is a digital investment platform with a mission to empower people to build their wealth for a better future. Faced with information overload and competing priorities, people with the desire to improve their wealth and financial future lack the time, patience and know-how to put their money to work. Current solutions fail to solve the...
-
Security Engineer
3 weeks ago
Gurugram, India Steerlean Full timeCloud Security Architecture : Asses, help in design and development of AWS, Azure and AWS security architectures for protecting PII/PCI data deployed into different types of cloud and cloud/hybrid systems. Improve the security around cloud-based applications, across all types (including Infrastructure, Platform, and Software as a Service...
-
Security Engineer
3 weeks ago
Gurugram, Gurugram, India NexionPro Services Full timeJob Description Key Responsibilities - Perform vulnerability assessments across cloud platforms and workloads using Wiz, Tenable, and SonarQube. - Classify vulnerabilities by severity, remediation type (Terraform fix, code refactor, policy update), and level of effort (LOE). - Track, manage, and drive remediation efforts to closure, ensuring timely risk...
-
Cloud Security Engineer
3 weeks ago
Gurugram, India Anisha Global Services Full timeLooking for Cloud Security Enngineer with 7 to 11 years exp.Budget 30 LPASkills:Cloud security Engineer with AWS and AZURENight Shiftwhats app or call on
-
Cyber Security Engineer
3 weeks ago
Gurugram, India Decoding IT Solution Full timeAbout Us Decoding IT Solutions is a growing IT services and system integration company specializing in delivering end-to-end IT solutions for SMEs and enterprises. We focus on providing secure, reliable, and cost-effective IT services, including managed IT, cloud solutions, and cybersecurity. Company is handling customers in Oman, UAE and India. We are...
-
Security Engineer
3 weeks ago
Gurugram, India HyreSnap Full timeResponsibilities :- Vulnerability Assessment and Penetration Testing against Web applications, Mobile applications(Android and iOS), and Infrastructure.- Vulnerability management adheres to the ISMS policy and regulatory compliance.- Document TTP (Techniques, Tactics, and Procedures) used during a security assessment- Hands-on experience with SAST, DAST, and...