OneMain Financial Jobs

Job Information

Insight Global Senior Engineer- Compliance- Red Team Specialist in Atlanta, Georgia

Job Description

Design and execute attack scenarios mapped to MITRE ATT&CK techniques

Assist in maintaining and enhancing internal offensive security toolkits and operator playbooks

Develop or modify scripts in Python, PowerShell, and Bash to support Red Team activities

Conduct phishing, vishing, and other social engineering attacks to assess human-layer risk

Maintain strict operational security during engagements, including infrastructure hygiene, traffic obfuscation, and log minimization

Ensure all engagements are executed safely without disrupting production environments

Produce detailed technical reports documenting attack paths, vulnerabilities, and exploitation techniques

Map findings to MITRE ATT&CK techniques and provide clear, actionable remediation guidance

Participate in purple team debriefs to help defensive teams understand attacker techniques and detection improvement opportunities

Collaborate closely with SOC, Incident Response, and engineering teams to validate detections and enhance defensive capabilities

Support the development of detection use cases, logging improvements, and incident response playbooks

Pay Rate will be between $10-$14 an hour depending on skills and experience.

We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Skills and Requirements

Required Experience

4–7 years of experience in Information Security Compliance, Red Team, or a related field

Proven experience conducting Red Team assessments and infrastructure penetration testing

Hands-on experience operating within Red Team environments

Essential Skills

Ability to execute end-to-end attack chains, including reconnaissance, exploitation, lateral movement, persistence, and exfiltration

Conduct internal and external attack simulations emulating realistic threat actor TTPs

Demonstrated experience with exploitation, privilege escalation, lateral movement, and post-exploitation techniques across Windows and Linux environments

Strong understanding of network protocols, authentication mechanisms, and common security misconfigurations

Perform web application, infrastructure, and cloud-focused attacks as part of multi-vector engagements

Experience utilizing command-and-control (C2) frameworks such as Cobalt Strike, Empire, or Covenant to develop and manage covert operations

Proven ability to think creatively and simulate an attacker mindset

Ability to operate discreetly and ethically under strict confidentiality controls

Provide training and delegate tasks to lower-level security engineers

Excellent written communication and technical documentation skills

Collaborate with analysts and engineers to test, validate, and deploy remediation fixes

Desired Skills

Experience with Active Directory attack paths, including Kerberoasting, AS-REP Roasting, constrained and unconstrained delegation abuse, DCsync/DCshadow, and BloodHound path reduction

Practical offensive security experience in Azure/Microsoft 365 (Entra ID) and/or Google Cloud Platform (GCP), including identity abuse, misconfigured roles and policies, workload identity takeover, OAuth application abuse, and cross-tenant risks

Initial access tradecraft, including macro-less delivery, HTA/JavaScript techniques, OAuth abuse, token replay, and cloud misconfiguration pivots

Experience building operator-grade tools using Python, Go, or PowerShell beyond simple scripting (e.g., custom loaders, C2 extensions, OPSEC-safe reconnaissance tooling)

Advanced web exploitation techniques such as SSRF metadata pivots, deserialization chains, cache poisoning, and template injection

Knowledge of API attack patterns, including authentication and authorization flaws, mass assignment, BOLA vulnerabilities, and GraphQL nuances

Exposure to mobile application or thick-client security assessments

Understanding of blue team telemetry (e.g., Sysmon, Microsoft Defender for Endpoint, Splunk) to plan stealthy operations and propose detection use cases from an offensive perspective

Awareness of evidence handling and clean artifact capture to support post-engagement analysis

Experience with Red Team infrastructure buildout, including domain fronting, redirector chains, TLS fingerprinting evasion, staging servers, and resilient DNS configurations

Ability to deliver executive-ready storytelling, including attack path narratives, business impact translation, and risk-based remediation roadmaps

Strong visual reporting skills, including attack flow diagrams, MITRE ATT&CK heatmaps, and kill chain overlays

Experience leading a Red Team workstream (e.g., phishing, Active Directory, cloud) and mentoring junior operators

Exposure to Red Team operations in regulated environments (PCI, SOX, HIPAA) with appropriate safe-testing controls

DirectEmployers