CONTEXT
To support our business strategy and digital transformation, AXA is building a new Group Information Security Practice to ensure a coordinated response to the increasing cyber security threat, enable risk decisions to be made consistently across the organization and establish sustainable security capabilities that are integrated with the business. Our vision for Information Security is to ‘protect our stakeholders by securing our information assets, managing our cyber risk and enabling business strategies in an efficient and effective way, fully supported by executive leadership and underpinned by all AXA employees’
MISSIONS
- Red Team Operations: Plan, coordinate, and execute red team operations to simulate advanced cyber threats targeting our organization's assets, infrastructure, and personnel.
- Adversary Emulation: Mimic the tactics, techniques, and procedures (TTPs) of sophisticated threat actors to identify weaknesses in our security defenses and response capabilities.
- Penetration Testing: Conduct comprehensive penetration tests to assess the effectiveness of security controls, including network, application, and physical security measures.
- Vulnerability Research: Identify and exploit vulnerabilities in systems, applications, and devices to demonstrate potential attack vectors and provide actionable recommendations for mitigation.
- Tool Development: Develop and customize tools, scripts, and exploits to support red team operations and enhance the efficiency and effectiveness of simulated attacks.
- Reporting and Documentation: Document findings, including identified vulnerabilities, successful attack paths, and recommendations for remediation, in clear and concise reports for stakeholders, providing guidance and priorities for correcting and remediating activities.
- Collaboration and Training: Collaborate with cross-functional teams, including blue teams, incident responders, and security operations centers (SOCs), to improve detection and response capabilities. Provide training and mentorship to junior team members.
- Continuous Learning: Stay up-to-date with the latest cybersecurity threats, attack techniques, and defensive strategies. Participate in training, conferences, and research activities to enhance skills and knowledge. Test and assess the effectiveness of information security controls across the organization.
Education
Bachelor degree in Computer Science, Engineering, project management or related field.
Certification
Information Security and/or Information Technology industry certification (CISSP, CISA, CISM, GIAC, CRISC, OSCP, OSCE, Crest or equivalent) preferred.
Overall work experience in the field
- Experience in assurance testing/red team/penetration testing activities > 3 years.
- Experience with project management and coordination < 3 years.
- Experience of working with specific Information Security Controls and Vulnerability Databases > 3 years.
- Experience in network and/or firewall engineering, administration, design and implementation including experience in applying methodologies and principles for all levels of Information Security < 3 years.
- Experience with technologies, tools and process controls to minimize risk and data exposure < 3 years.
Skills / abilities
- Ability to function effectively in a matrix structure.
- Good facilitation, negotiation and conflict resolution skills.
- Good networking skills.
- Team player.
- Apply analytical rigor to understand complex business scenarios.
- Fluent in English.
- Ability to organize.