Offensive Security Engineer (Red Team)

Security (SC)

Person, Crowd, Audience, Clothing, Apparel, People

Offensive Security Engineer (Red Team)

  • Remote, United States
  • Remote, District of Columbia, United States
  • Chicago, Illinois, United States
  • Boston, Massachusetts, United States
  • Remote, Nevada, United States
  • Remote, New York, United States
  • Portland, Oregon, United States
  • Austin, Texas, United States
  • Seattle, Washington, United States
  • Full time

Work Styles at Zoom

In most cases, you will have the opportunity to choose your preferred working location from the following options when you join Zoom: in-person, hybrid or remote. Visit this page for more information about Zoom's Workstyles.

About Us

Zoomies help people stay connected so they can get more done together. We set out to build the best video product for the enterprise, and today help people communicate better with products like Zoom Contact Center, Zoom Phone, Zoom Events, Zoom Apps, Zoom Rooms, and Zoom Webinar.

We’re problem-solvers, working at a fast pace to design solutions with our customers and users in mind. Here, you’ll work across teams to deliver impactful projects that are changing the way people communicate and enjoy opportunities to advance your career in a diverse, inclusive environment.

Zoom is seeking an Offensive Security Engineer to join our Red Team. Our engineers perform operations from an adversarial perspective, emulating capabilities of threat actors to demonstrate the organizational impact of an incident and train our cyber defense teams to recognize and defend against real world Tactics, Techniques, and Procedures. We’re looking for engineers with a breadth of knowledge in offensive security and in-depth knowledge of red team tradecraft.

Responsibilities:

  • Perform red team assessments of Zoom’s cyber security defenses (people, processes, tools, and detections) of systems, services, applications, and cloud infrastructure.

  • Participate in adversary emulation campaigns. Emulate TTPs of known Advanced Persistent Threats (APTs).

  • Participate in red team operation planning. Create attack scenarios containing impact and training objectives based on business needs.

  • Identify and evaluate business processes to uncover organizational risks.

  • Build automation to scale red team operations and to test threat detection and response capabilities.

  • Document red team reports, and presentations diagramming attack chains, timelines, and compromise metrics.

  • Present findings to various technical and non-technical audiences, as well as to executive leadership.

  • Plan and Participate in Purple Team exercises, collaborating with Zoom cyber security defense teams.

  • Plan and participate in social engineering operations. Perform OSINT to draft social engineering pretext for phishing and vishing campaigns.

  • Plan and scope physical security assessments to identify gaps in physical security controls and processes.

  • Develop payloads, scripts and tools that weaponize new concepts for exploitation, evasion, and lateral movement.

Requirements:

  • A minimum of 2 years experience in offensive security

  • Programming experience in at least 1 of the following languages: Python, PowerShell, Bash, C/C++, Objective C Swift, C#, Java, JavaScript, GoLang

  • Ability to develop automation tools to scale Red Team services

  • Experience with post-exploitation frameworks such as Cobalt Strike, Metasploit, Mythic, Sliver, or Covenant

  • Proficiency in 1 or more operating systems: Linux, Windows, MacOS

  • Strong analytical and problem-solving skills

  • Have strong communication skills, both written and verbal: we have a lot of remote and asynchronous communication given our distributed teams and customers

  • Relevant certifications from organizations like Offensive Security (OSCP/OSCE), SANS (GPEN, GXPN, GWAPT), or CREST CSAT/CSAM or demonstrable equivalent skills is a plus

  • Experience penetration testing or red teaming in cloud environments (AWS, Azure, GCP) is a plus

  • Desire to build and grow purple teaming effort is a plus

  • Security community participation (conference speaker or tool contributor) is a plus

  • Prior experience penetration testing or red teaming in a zero trust environment is a plus

We believe that the unique contributions of all Zoomies is the driver of our success. To make sure that our products and culture continue to incorporate everyone's perspectives and experience we never discriminate on the basis of race, religion, national origin, gender identity or expression, sexual orientation, age, or marital, veteran, or disability status. Zoom is proud to be an equal opportunity workplace and is an affirmative action employer. All your information will be kept confidential according to EEO guidelines. 

We welcome people of different backgrounds, experiences, abilities and perspectives including qualified applicants with arrest and conviction records and any qualified applicants requiring reasonable accommodations in accordance with the law. If you need any assistance or accommodations due to a medical condition, or if you need assistance accessing our website or completing the application process, please let us know by emailing us at careers@zoom.us.

Zoom requires all U.S. employees who will work in person at a Zoom office, attend in-person Zoom meetings or have in-person customer meetings to be fully vaccinated.  Zoom will consider requests for reasonable accommodations for religious or medical reasons as required under applicable law.

At Zoom, we care about our employees, their families, and their well-being. As part of our award-winning workplace culture and commitment to delivering happiness, our benefits program offers a variety of perks, benefits, and options to help employees maintain their physical, mental, emotional, and financial health; support work-life balance; and contribute to their community in meaningful ways. To view our benefits, click here.

Explore Zoom:

#LI-Remote

Fraudulent Employment Offers

Zoom is aware of scams that involve fake Zoom job listings posted on third-party sites. Responding applicants are contacted primarily over email, InMail and/or chat applications by people impersonating Zoom employees. Eventually a fake offer letter is sent in exchange for personal identification information as part of a fake new-hire screening process.

Please be advised that these offers, communications and impersonations are illegitimate and fraudulent. All communication with Zoom employees come from an “@zoom.us” email address. Zoom job applicants complete an interview process including in-person (on Zoom) meetings and phone calls. Our process also requires you to create an account with our applicant tracking system, Workday. If you have already completed an application, you can access it here. 

Zoom will never ask for your personally identifying information during the interview process or ask you to pay money or purchase equipment. If you have received a message from Zoom that appears suspicious, please contact careers@zoom.us. 

Sign up for job alerts

Find roles that are just the right fit for you, delivered straight to your inbox. The next opportunity you see could become your new career.

Not You?

We have emailed you a code to verify your identity

Thank you for signing up for job alerts from Zoom!

Person, Laptop, Pc, Mouse, Hair, Sitting, Female, Table, Woman, Girl