Job Specifications
Our employees are at the heart of everything we do. Together, we help people, businesses, and society prosper in good times and be resilient in bad times.
Our employee promise represents Intact’s commitment to you in exchange for living our Values, striving to do your best work, being open to change and investing in your career. In return, we promise to provide support, opportunities and performance-led financial rewards at a workplace where you can shape the future, win as a team and grow with us.
About The Role
The Security Specialist, Offensive Security is responsible for testing the security controls, the network, and threat response for Intact Financial globally (All regions and all affiliate companies). He/she works as a specialist employing techniques, tactics and protocols to test security controls, working as part of a global offensive security team.
The Specialist, Offensive Security reports to the Director, Offensive Security and works with a team of technical advisors across multiple locations and time zones.
If you can think outside of the Kali box, and love to think like an attacker (with a track record to prove your capabilities) we want to talk to you about joining our team!
What You'll Do Here
Conduct reconnaissance on network environment to build external landscape using industry standard tools, threat intelligence feeds, OSINT and other readily available information sources
Conduct offensive security testing to ensure security controls and response actions are effective. If you are detected, shifting from a red team focus to a purple team approach – your purpose isn’t to create a “Gotcha!” moment – our mission is to strengthen our controls throughout the entire attack chain across the enterprise.
Employ attack strategies to simulate real-world attacks by threat actors and benchmark response capabilities across the enterprise.
Ability to identify and exploiting vulnerabilities in computer systems, networks and applications to simulate attacks by threat actors – you have a proven track record of evading modern EDR (eg. Crowdstrike, MDE, SentinelOne) while elevating privileges/hitting your target.
Analyze and report on the results of security assessments and make recommendations to improve the security posture of the enterprise.
You understand the TCP/IP stack in depth and know how to exploit it to create covert beacons, C2 channels, exfiltrate data across DNS. Understanding how routing tables work (eg. BGP) and how they can be exploited is an asset.
Work with regional cyber governance and risk teams to ensure that findings are properly tracked for remediation
Generate the required metrics and reports to support the CISO IFC Affiliates in reporting on enterprise security control effectiveness
Leverage industry standard and emerging tools to evaluate emerging threats to the financial services space and benchmark regions and affiliate companies to peers.
Able to consume threat intelligence and apply the attack surface to crown jewel assets for target and tactic development, proposing clear rules of engagement for testing activities (either one time or perpetual) and ensuring compliance to the ROE through all phases of testing.
Maintain and update all offensive security tools, technologies and processes in line with company rules of engagement
Provide timely and effective communications to key internal stakeholders in alignment with policy and rules of engagement.
What You Bring To The Table
Advanced knowledge in the following areas: computer networks, operational security platforms, information security principles, TCP/IP, DNS, UDP, BGP, SOC, IAM, SIEM, DLP, EDR, Threat intelligence, Incident Response, technical writing, information risk.
Bachelor's degree in Computer Technology, Information Security, an asset.
A minimum of five (5) years of relevant professional experience in information technology.
A minimum of three (3) years of experience in information security.
Knowledge of offensive security operations, tools and techniques.
Knowledge of information security standards, regulations and legislation (NIST, COBIT5, ISO 27001), an asset.
Python scripting comes naturally, and have a history of using it in blue/red/purple team engagements
Proficiency in manual testing techniques beyond automated scanning.
Strong knowledge of OWASP Top 10, MITRE ATT&CK, and CVSS scoring.
You can take many vectors of technical vulnerability information (Pentest reports, vulnerability scanning data, SAST/DAST reports) and build an attack plan on critical assets.
You must have the ability to take highly technical data and results and translate them to business-friendly language to help non-technical stakeholders understand the approach, impact and outcome from offensive security operations.
If you’ve joined capture the flag competitions (even better if you won) we want to hear about it!
Recognized certification in information security (CEH, CISM or other), an asset.
Analytical mind, pragmatic approach to
About the Company
We created a purpose-driven company based on Values and a belief that insurance is about people, not things. This is the foundation on which we have built Intact and it lives every day through our purpose, Values, what we aim to achieve and how. ___ Nous sommes la pour aider les gens, les entreprises et la societe a aller de l'avant dans les bons moments et a etre resilients dans le moments difficiles. Notre entreprise est basee sur des valeurs et la conviction que l'assurance doit d'abord s'interesser aux personnes, et non ...
Know more