Director - Red Team Product Security
Listed on 2026-03-04
-
IT/Tech
Cybersecurity, IT Consultant, Security Manager, Data Security
About Salesforce
Salesforce is the #1 AI CRM, where humans with agents drive customer success together. Here, ambition meets action. Tech meets trust. And innovation isn’t a buzzword — it’s a way of life. The world of work as we know it is changing and we're looking for Trailblazers who are passionate about bettering business and the world through AI, driving innovation, and keeping Salesforce's core values at the heart of it all.
Ready to level-up your career at the company leading workforce transformation in the agentic era? You’re in the right place! Agentforce is the future of AI, and you are the future of Salesforce.
Role OverviewWe are looking for an experienced cyber security expert who will serve as Red Team Director with a deep hands‑on offensive security mindset to lead and execute real‑world adversary simulations across our products, platforms, and enterprise environment. This role goes beyond Red Team exercises or reporting findings; you will actively uncover weaknesses in our products and features and use them as pivotal entry points to demonstrate how attackers can move from product abuse to broader platform, customer, or enterprise compromise, driving measurable improvements in security controls and Detection & Response capabilities.
You will lead and participate in red team operations, work as a trusted partner to engineering and Detection & Response teams to measurably raise the organization’s security resilience against real attack scenarios.
- Lead and execute hands‑on Red Team operations simulating real‑world threat actors across applications, platforms, cloud infrastructure, and enterprise environments.
- Deeply understand our products through the lens of adversary abuse and exploitation.
- Design and conduct attack campaigns, emulating various attack scenarios.
- Focus on high‑impact weaknesses and chained vulnerabilities to achieve goals.
- Actively perform offensive activities, including:
- Engage with the AI‑Automation team to develop sophisticated tools and frameworks.
- Manual exploitation and chaining of weaknesses.
- Abuse of identity, authorization, and trust relationships.
- Drive Adversary‑Centric thinking by:
- Simulating realistic attacker objectives towards Salesforce and constraints.
- Prioritizing paths that lead to meaningful business impact.
- Partner with:
- Detection & Response teams to test and improve visibility, alerts, and response metrics.
- Incident Response teams to evaluate containment and recovery effectiveness.
- Engineering and platform teams to explain exploitation paths and root causes.
- Reporting that will reflect a clear, actionable remediation guidance that improves security at scale.
- Influence security strategy by:
- Identifying recurring attack paths and systemic gaps.
- Recommending architectural, platform, and process‑level improvements.
- Upskill Red Team operators and offensive security engineers, raising operational maturity and tradecraft quality.
- Deep expertise in Offensive Security, Red Teaming/High Impact Pentesting, with a strong attacker mindset.
- Proven personal experience executing Red Team/High Impact Pentesting engagements.
- Strong understanding of:
- Adversary tactics, techniques, and procedures (TTPs).
- Identity and access abuse.
- Application/infrastructure attack kill chains.
- Cloud and hybrid enterprise attack surfaces.
- Hands‑on experience with:
- Manual/Automatic exploitation and attack chaining.
- Writing custom tooling, scripting, or payload development.
- Bypassing security controls and detections.
- Ability to clearly articulate:
- How attacks work.
- Why defenses failed.
- What changes will meaningfully reduce risk.
- Communication skills and experience collaborating with security and engineering teams.
- Experience running Red Team Operations, Cyber‑Research, and/or High impact Pentesting.
- Research & Disclosure and track record of discovering and responsibly disclosing security vulnerabilities through CVEs, publications, blogs or event talks/presentations.
- Malware analysis experience with practical real‑world threat actor knowledge.
- Background in threat simulation, adversary emulation, or breach‑and‑attack methodologies.
- Experien…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).