Offensive Security Engineer, Sr

About The Unit: The BSD Information Security Office (ISO) is dedicated to providing information security services and expert security guidance to all members of the BSD research and academic enterprise. The ISO's mission is to ensure confidentiality, integrity, and availability of BSD information assets and data, in accordance with organizational policies and applicable state and federal laws, as efficiently as possible. The Center for Data Intensive Science is a research center that focuses on data science and its applications to problems in biology, medicine, and health care. We develop technology to manage, analyze and share large biomedical data-sets and apply this technology to make discoveries in biology, medicine and health care. Broadly speaking, we are focused on the emerging field of translational data science. We work with the research community through partnerships and consortia that share our vision. CDIS is hosting several large projects at the University of Chicago including: - NCI Genomic Data Commons (GDC) is a unified knowledge base that promotes sharing of genomic and clinical data between researchers and facilitates precision medicine in oncology. The NCI GDC breaks down barriers by bringing cancer genomics data-sets and associated clinical data into one location that any researcher may access, and "harmonizing" the data so that data-sets that were generated with different protocols can be studied side by side. Then, by making these data available using modern computing and network technology, the GDC makes it possible for any researcher to ask new and fundamental questions about cancer. - Bionimbus Protected Data Cloud (PDC) is the first open-source cloud-based computational platform that allows researchers authorized by NIH to compute over human genomic data in a secure and compliant fashion. Bionimbus and related cloud-based infrastructure are used by researchers working on cancer, diabetes and neuropsychiatric disorders. - Open Science Data Cloud (OSDC) provides the scientific community with resources for storing, sharing, and analyzing terabyte and petabyte-scale scientific data-sets. The OSDC is a data science ecosystem in which researchers can house and share their own scientific data, access complementary public data-sets, build and share customized virtual machines with whatever tools necessary to analyze their data, and perform the analysis to answer their research questions. Both the BCC and OSDC are collaborations with the not-for-profit Open Cloud Consortium. Join us in transforming cancer research.

Unit Job Summary: Under general direction, the Offensive Security Engineer will provide technical leadership for our offensive security team and execute tactical, offensive assessments across our environment working closely both BSD and CDIS internal and external teams on building and maintaining effective security controls. Responsibilities: - Lead offensive capabilities for Biological Sciences Division and Center for Data Intensive Science, including building out a long term strategy and approach - Develop the program and methodology that shapes how we approach red team and pentest operations - Build or implement tool to automate red team and pentest operations - Perform scoped and open-ended assessments on internal and external facing systems - Provide subject matter expertise through participation in planning and development teams and as leader on solution design and deployments. - Ensure security tools are optimized and address risks, weaknesses, controls and develop recommendations and plans to remediate vulnerabilities.

Unit Education: Bachelor of Science in a related field such as Computer Science, Information Science and Security OR four (4) years of substantial related professional experience required. Advanced degree preferred. Certification of one (1) or more: Security+, CISSP, CISM, CEH, GCIH preferred.

Unit Experience: Minimum of three (4) years of progressively responsible and directly related work experience required. Minimum of two (2) years of experience performing reconnaissance, exploitation and lateral/vertical privilege escalation aimed at compromising networks/applications/individuals required. Experience with information security in a cloud or virtualized infrastructure environment preferred. Experience writing automation tools using any scripting language preferred. Experience with FedRAMP, NIST, FISMA and IT governance compliance processes and procedures preferred. Hands on experience with infrastructure (firewalls, load balancers, scanners, hypervisor, storage, monitoring, etc) preferred. Hands on experience with commercial cloud providers (AWS, Google, Azure) and strong understanding of their capabilities and limitations preferred. Experience providing direction and guidance on architectural use cases and requirements for security related efforts preferred. Writing experience with scenarios where shifting from high-level thinking to realistic, pragmatic execution was required preferred.

Unit Job Function Competencies: Knowledge with common threat modeling approaches, common enterprise attack surfaces required. Knowledge of philosophies, concepts and tools behind the design of secure information systems required. Strong knowledge of server (Linux, Windows) and client (Windows, OS X, Linux) operating systems required. Strong understanding of data communication concepts and network/software configuration management required. Excellent deductive and investigative skills to diagnose complex, non-intuitive technical problems required. Ability to conceptualize a course of action and to organize for the successful completion of that action critical, often under tight deadlines required. Ability to organize multiple concurrent tasks, problem-solve and take initiative required. Ability to respond to critical incidents and provide network support outside of normal business hours required. Familiarity with research technology and processes preferred.