×
Register Here to Apply for Jobs or Post Jobs. X

Lead, Offensive Security Engineer

Job in Newark, Essex County, New Jersey, 07175, USA
Listing for: Prudential Financial
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant, Information Security
Job Description & How to Apply Below

Overview

Technology - Information Security

Are you interested in building capabilities that enable the organization with innovation, speed, agility, scalability and efficiency? The Global Technology team takes great pride in our culture where digital transformation is built into our DNA! When you join our organization at Prudential, you’ll unlock an exciting and impactful career – all while growing your skills and advancing your profession at one of the world’s leading financial services institutions.

Your

Team & Role

As a Lead Offensive Security Engineer on the Attack Surface Management team, you will be at the forefront of our efforts to identify and mitigate security risks. Your responsibilities will include conducting sophisticated red team and purple team exercises to challenge and refine our defensive strategies. You will conduct a variety of penetration testing activities, focusing on diverse targets such as web applications, AI systems, and Active Directory environments, in order to uncover and address vulnerabilities.

Beyond traditional offensive security operations, you will also play a key role in supporting and advancing our bug bounty program, ensuring that any potential threats are swiftly identified and resolved.

What You Can Expect on a Typical Day
  • Conduct Purple Team Assessments:
    Collaborate with the defensive (blue) team to run combined exercises that enhance detection and response capabilities, fostering a stronger overall security posture.
  • Perform Penetration Testing:
    Execute comprehensive penetration tests on various systems, including web applications, mobile applications, external networks, AI/ML systems, and SaaS environments.
  • Adversary Emulation:
    Emulate tactics, techniques, and procedures (TTPs) of known threat actors to test the effectiveness of security controls and incident response processes.
  • Vulnerability Identification and Exploitation:
    Identify and exploit weaknesses in systems and applications to demonstrate potential risks and impact.
  • Support Bug Bounty Programs:
    Participate in and enhance the bug bounty program by validating submissions, providing detailed analysis, and collaborating with researchers and internal stakeholders to address vulnerabilities.
  • STRIDE Threat Modeling:
    As an SME in attack and vulnerability exploitation techniques, assist stakeholders in comprehensive Threat Modeling exercises to identify potential weaknesses and harden systems.
  • Develop Offensive Security Tools:
    Create and maintain tools and scripts to assist with red team operations and penetration testing efforts.
  • Conduct Security Research:
    Regularly research and learn new TTPs in public and closed forums. Work with teammates to assess Prudential’s risk and work with teams to implement and validate controls as necessary.
  • Threat Intelligence Integration:
    Utilize threat intelligence to inform red team scenarios and improve the realism and relevance of simulations.
  • Plan and Execute Red Team Exercises:
    Design and carry out advanced red team operations to simulate real-world attacks, identifying and exploiting vulnerabilities within client environments.
  • Reporting and Documentation:
    Produce detailed reports of findings, including technical descriptions of vulnerabilities, potential impacts, and recommended remediation steps.
  • Engage with Stakeholders:
    Communicate effectively with internal and external stakeholders to present findings, provide recommendations, and support remediation efforts.
  • Knowledge Sharing and Training:
    Conduct internal training sessions, workshops, and presentations to share insights and improve the overall skill level of the security team. Mentor and knowledge share with other Offensive Security engineers on the team.
  • Continuous Improvement:
    Regularly review and refine testing methodologies, tools, and processes to ensure cutting-edge offensive security practices.
  • Provide Remediation Guidance:
    Offer expert recommendations to internal stakeholders on how to address and mitigate identified security vulnerabilities, ensuring they adopt best practices for enhanced protection.
The Skills & Expertise You Bring
  • Bachelor of Computer Science or Engineering or experience in related fields
  • Ability…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary