CrawlJobs Logo

Cybersecurity Red Team Project Manager

https://www.soprasteria.com Logo

Sopra Steria

Location Icon

Location:
Belgium , Brussels

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Cyber Security Project Manager focuses on coordinating penetration testing projects, ensuring communication among customers and internal stakeholders, and documenting processes while ensuring quality assurance for testing reports and refining the test schedule.

Job Responsibility:

  • Coordinate all project activities with internal stakeholders (Lead Penetration Tester, Awareness Expert, Technical Quality Manager) and the customer
  • plan and execute penetration testing tasks, including scoping meetings and drafting the penetration testing plan
  • prepare and control access rights for penetration tests
  • refine and manage the security test calendar/schedule, ensuring tasks are executed according to plan
  • proactively inform stakeholders (e.g., ECB) about issues such as delays, resource unavailability, or other factors affecting testing or timelines
  • oversee quality assurance for penetration tests, including reviewing penetration testing reports
  • coordinate threat-based testing with the Lead Penetration Tester and awareness sessions with the Awareness Expert
  • support process improvement and documentation of vulnerability management in collaboration with the Technical Quality Manager
  • facilitate stakeholder communication and ensure completeness of handovers and knowledge transfer between resources.

Requirements:

  • Technical expertise in system security vulnerabilities, remediation techniques, and network/web protocols (e.g., TCP/IP, UDP, IPSEC, HTTP)
  • experience in network, web application, and mobile penetration testing
  • familiarity with penetration testing tools and suites (e.g., Kali Linux, Burp Suite, Metasploit, Cobalt Strike, Mimikatz)
  • understanding of vulnerability scoring systems (CVSS) and frameworks (MITRE ATT&CK)
  • software development skills (C/C++, Java, Python) are advantageous
  • at least one relevant security certification (e.g., CEH, GPEN, GXPN, OSCP, OSC, or equivalent).

Nice to have:

  • Software development skills (C/C++, Java, Python)
  • familiarity with penetration testing tools and suites (e.g., Kali Linux, Burp Suite, Metasploit, Cobalt Strike, Mimikatz)
  • understanding of vulnerability scoring systems (CVSS) and frameworks (MITRE ATT&CK).
What we offer:
  • Mobility options (including a company car)
  • insurance coverage
  • meal vouchers
  • eco-cheques
  • continuous learning opportunities through the Sopra Steria Academy
  • the opportunity to connect with fellow Sopra Steria colleagues at various team events.

Additional Information:

Job Posted:
June 11, 2025

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Cybersecurity Red Team Project Manager

Red Team Operations Manager

To lead, oversee, and quality assure the execution of Red Team engagements end-t...
Location
Location
Australia
Salary
Salary:
Not provided
bugcrowd.com Logo
Bugcrowd
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Extensive experience leading and/or managing Red Team engagements in enterprise environments, preferably across multiple industries (e.g. finance, critical infrastructure, cloud / SaaS / OT)
  • Deep technical knowledge of exploitation, post-exploitation, lateral movement, persistence, command & control, evasion, privilege escalation
  • Good knowledge and experience with Blue Team controls e.g. IDS/IPS, SIEM, EDR, NGFW, log analysis, detection engineering, ideally experience in bypassing or evading them safely
  • Solid experience with modern cloud environments (Azure, AWS, GCP), hybrid / on-premise networks, potentially OT/IoT/industrial environments
  • Strong tradecraft / OpSec awareness around how to avoid detection and conduct operations with minimal operational risk
  • Familiarity with CREST / STAR / TIBER etc. and regulatory / compliance requirements in relevant geographies
  • Proven experience in threat intelligence ingestion, scenario design, mapping to relevant threat actors
  • Excellent written and verbal communication skills and able to produce high quality reports, executive summaries, interact with senior leadership, legal, compliance etc.
  • Good project / operations management skills with an eye for budgeting, scheduling, resource allocation, interfacing external/internal teams
  • Ability to make real-time decisions under pressure, to balance risk vs reward
Job Responsibility
Job Responsibility
  • Lead multiple concurrent Red Team engagements across industries
  • Define, negotiate and document scope, objectives, rules of engagement, deliverables, constraints, escalation & approval pathways
  • Oversee milestone planning e.g. kick-offs, stand-ups, wash-ups, strategic debriefs
  • Manage resources e.g. operator assignments, tooling, support functions
  • Track engagement progress vs objectives, adjust as needed
  • Assess and manage technical risk ensuring that any red team activity minimises risk to customer operations, data, systems
  • Real-time decision making during operations around TTP deployment, bypass of defenses, managing detections or unexpected discovery
  • Review and approve attack plans, threat modelling, intelligence
  • Ensure operators employ strong operational security (OpSec), safe tradecraft, evidence collection, clean up post-engagement
  • Maintain up-to-date knowledge of Red Team tools, adversary TTPs, defensive controls, detection systems
Read More
Arrow Right

Red Team Operations Manager

To lead, oversee, and quality assure the execution of Red Team engagements end-t...
Location
Location
United Kingdom
Salary
Salary:
Not provided
bugcrowd.com Logo
Bugcrowd
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Extensive experience leading and/or managing Red Team engagements in enterprise environments, preferably across multiple industries (e.g. finance, critical infrastructure, cloud / SaaS / OT)
  • Deep technical knowledge of exploitation, post-exploitation, lateral movement, persistence, command & control, evasion, privilege escalation
  • Good knowledge and experience with Blue Team controls e.g. IDS/IPS, SIEM, EDR, NGFW, log analysis, detection engineering, ideally experience in bypassing or evading them safely
  • Solid experience with modern cloud environments (Azure, AWS, GCP), hybrid / on-premise networks, potentially OT/IoT/industrial environments
  • Strong tradecraft / OpSec awareness around how to avoid detection and conduct operations with minimal operational risk
  • Familiarity with CREST / STAR / TIBER etc. and regulatory / compliance requirements in relevant geographies
  • Proven experience in threat intelligence ingestion, scenario design, mapping to relevant threat actors
  • Excellent written and verbal communication skills and able to produce high quality reports, executive summaries, interact with senior leadership, legal, compliance etc.
  • Good project / operations management skills with an eye for budgeting, scheduling, resource allocation, interfacing external/internal teams
  • Ability to make real-time decisions under pressure, to balance risk vs reward
Job Responsibility
Job Responsibility
  • Lead, oversee, and quality assure the execution of Red Team engagements end-to-end from scoping & planning, through execution, reporting, to debrief and capability development
  • Ensure that all operations are safe, legal, technically robust, aligned with threat intelligence, compliance frameworks, and deliver high value to customers
  • Act as a subject-matter expert and manager for both operations and sales / client-facing aspects of Red Team services
  • Lead multiple concurrent Red Team engagements across industries
  • Define, negotiate and document scope, objectives, rules of engagement, deliverables, constraints, escalation & approval pathways
  • Oversee milestone planning e.g. kick-offs, stand-ups, wash-ups, strategic debriefs
  • Manage resources e.g. operator assignments, tooling, support functions
  • Track engagement progress vs objectives, adjust as needed
  • Assess and manage technical risk ensuring that any red team activity minimises risk to customer operations, data, systems
  • Real-time decision making during operations around TTP deployment, bypass of defenses, managing detections or unexpected discovery
Read More
Arrow Right

Technical Engagement Manager II

Bugcrowd is seeking a highly skilled Technical Engagement Manager II (TEM II) to...
Location
Location
Australia
Salary
Salary:
Not provided
bugcrowd.com Logo
Bugcrowd
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-6 years of experience in a customer-facing technical role such as implementation, solutions architecture, technical program management, or professional services
  • Deep knowledge of pentest, bug-bounty and red-team methodologies
  • Strong problem solving skills and ability to manage multiple projects simultaneously
  • Excellent written & verbal communication with customer facing mindset
  • Ability to work collaboratively in a cross functional environment
Job Responsibility
Job Responsibility
  • Lead the end to end technical onboarding and configuration of Bug Bounty, Vulnerability Disclosure, Red team and pentest programs for new and existing customers
  • Translate customer security requirements into tailored program designs and platform configurations
  • Conduct technical program reviews, kickoff meetings, and walkthroughs with customers and internal stakeholders
  • Troubleshoot technical issues related to platform integrations, vulnerability workflows and reporting
  • Act as a technical point of contact during program launches, ensuring smooth transitions and early success
  • Provide expert guidance on offensive security engagements, vulnerability triage, communication workflows, and integration best practices
  • Collaborate closely with the Customer Relationship Managers and sales teams to align technical delivery with customer expectations
  • Partner with Line of Business Owners, Product, Engineering and Operations team to relay customer feedback and advocate for feature enhancements
  • Assist in developing and improving internal onboarding playbooks, technical documentation, and enablement materials
  • Support continuous improvement of delivery processes to drive consistency, quality and scalability
Read More
Arrow Right

Asia Cyber Security Operations Lead

Citigroup seeks an experienced, proactive, and innovative Asia Cybersecurity Ope...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 15+ years of experience in cybersecurity and financial services
  • Demonstrated leadership experience within security operations or similar functions
  • Proven track record of contributing to and managing security operations and supporting transformative change
  • Strong understanding of the cyber threat landscape, attack vectors, and mitigation strategies
  • Expertise in aspects of Security Operations Centers (SOC), Incident Response, Hunting Operations, Threat Defense, Penetration Testing, Vulnerability Management, Red Team operations, threat intelligence, and cybersecurity models
  • Strong communication, interpersonal, and team collaboration skills, with the ability to operate effectively across diverse regional cultures
  • Ability to work effectively in a fast-paced, high-pressure environment
  • Cybersecurity Leadership: Demonstrated ability to lead and motivate cybersecurity teams, manage projects, and contribute to strategic direction under pressure across multiple functions (SOC, Offensive Security, VM, Fusion Center)
  • Strategic Thinking: Capacity to assist in developing and implementing comprehensive Cybersecurity strategy aligned with business objectives and industry best practices across the JANA and Asia South regions
  • Transformation & Innovation: Experience supporting large-scale cyber and digital transformations, fostering a culture of innovation and continuous improvement
Job Responsibility
Job Responsibility
  • Contribute to and manage aspects of Cybersecurity Incident Response and Crisis Management within the JANA and Asia South regions
  • Oversee Hunting Operations and Threat Defense initiatives to proactively identify and neutralize threats
  • Lead and manage Penetration Testing, Vulnerability Management, and Red Team activities within the cluster
  • Support Third-party incident response and management processes
  • Assist in Critical Vulnerability response and remediation initiatives
  • Participate in and lead specific Cyber Exercises Program activities
  • Contribute to Cyber Threat Intelligence efforts and analysis
  • Support Cyber Data Analytics and reporting for regional operations
  • Assist in the development and implementation of Cybersecurity risk mitigation programs
  • Pro-actively support the Global Head in evolving the Cyber Fusion function and other cybersecurity operational capabilities, contributing to the development and implementation of a comprehensive strategy aligned with Citigroup's business enablement & efficiency objectives and security posture within the JANA and Asia South regions
  • Fulltime
Read More
Arrow Right

Senior Technical Program Manager - Red Team

The Cloud & AI organization accelerates Microsoft’s mission and bold ambitions t...
Location
Location
United States , Redmond
Salary
Salary:
119800.00 - 234700.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree AND 4+ years experience in engineering, product/technical program management, data analysis, or product development
  • 2+ years of experience managing cross-functional and/or cross-team projects
  • Ability to meet Microsoft, customer and/or government security screening requirements are required for this role
  • This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter
Job Responsibility
Job Responsibility
  • Creates relationships and rhythm to drive orchestration and integration efforts with internal teams and partners
  • Develops and implements processes for large and complex cross-functional programs, solutions, services, or integrated systems
  • Collaborates and coordinates across organizations to ensure alignment on program management, including tradeoffs, adjustments, and improvements as feasible
  • Documents, advises, and trains MRT personnel on filing procedures for findings of various types
  • Audits loop closure related activities
  • takes action to rectify discrepancies
  • Collects performance metrics (e.g., key performance indicators [KPIs] such as bug closure rate), monitors and reports on progress (e.g., business reviews), and derives deep insights that lead to productive courses of action to improve loop closure and risk reduction
  • Advocates for security change across the company by building partnerships and clearly communicating the impact of risks
  • Embodies our culture and values
  • Fulltime
Read More
Arrow Right

Principal Incident Commander

We're looking for an Information Security Incident Commander to join our team, p...
Location
Location
India , Bengaluru
Salary
Salary:
Not provided
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Previous incident management experience
  • 7+ years experience in information security
  • Strong written and verbal communication skills
  • Attention to detail
  • Investigative mindset
  • Ability to stay organized under pressure
  • Confidence to manage up to more senior leaders during incident response activities
  • Effective delegation of tasks across diverse workstreams
  • Experience leading functional groups/engagements
  • Awareness of Enterprise customers' expectations when communicating an incident or vulnerability
Job Responsibility
Job Responsibility
  • Identify which plans, playbooks, and processes apply to a particular Security Incident
  • Engage all required stakeholders for a particular response effort and ensure they are kept aware of all details and developments
  • Regularly update leadership on a regular cadence and when significant changes to previously known statuses arise
  • Lead incident bridge calls
  • Translate technical communications into non-technical communications
  • Assist in the development of an overall response strategy
  • Participate in preparedness activities such as tabletop exercises and red team events
  • Assist with internal and external incident related communication, both written and verbal
  • Document incident response efforts
  • Drive incident response efforts to meet SLOs and SLAs
What we offer
What we offer
  • Health coverage
  • Paid volunteer days
  • Wellness resources
  • Fulltime
Read More
Arrow Right

Client Delivery Executive

We are currently seeking a CDE II - Client Delivery Executive to join our team i...
Location
Location
United States , Atlanta
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Advanced degree in Information Technology, Computer Science, Software Engineering, Computer Engineering, or Cybersecurity
  • 5+ years of experience working in the Manufacturing, Banking, Commercial or Healthcare Industries with customers
  • 8+ years of experience in transitioning and managing Application, Public/Private Cloud, Infrastructure, Security, Workspace and Consulting services
  • 8+ years of experience managing a highly leveraged service environment
Job Responsibility
Job Responsibility
  • Accountable for end-to-end delivery of NTT DATA services for a specific client
  • Ensure adherence to contractual commitments
  • Monitor delivery quality and client satisfaction through direct interactions with key stakeholders
  • Develop and maintain Crisis Management/Disaster Plans
  • Implement project mitigation plans for yellow or red deliverables
  • Conduct Customer Governance meetings
  • Manage Outage/Escalation/Missed SLA incidents
  • Implement and execute automation and efficiency programs
  • Drive client improvement plans to enhance satisfaction
  • Utilize automation for repetitive tasks to boost performance and service quality
Read More
Arrow Right

Head of Information Security

As River Island’s Head of Information Security, you’ll play a strategic and hand...
Location
Location
United Kingdom , West London
Salary
Salary:
Not provided
riverisland.com Logo
River Island
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience in a senior information security role, ideally within a complex, multi-channel retail or technology environment
  • Strong technical grounding across key security domains: network, cloud, endpoint, application, and data security
  • Experience managing or working with vulnerability management tools, SIEM/SOC environments, and incident response processes
  • Familiarity with frameworks and standards such as ISO 27001, NIST, CIS, PCI DSS, and GDPR
  • Excellent communication and stakeholder management skills, with the ability to influence at all levels of the organisation
  • Analytical, pragmatic, and calm under pressure — with a focus on enabling the business, not blocking it
Job Responsibility
Job Responsibility
  • Define, implement, and evolve River Island’s information security strategy in line with business objectives, regulatory obligations, and risk appetite
  • Lead the development and maintenance of Information Security policies, standards, and controls, ensuring alignment with frameworks such as ISO 27001, NIST CSF, and the SANS Top 18
  • Define and report security KPIs/KRIs to senior management to senior leadership representing risk posture, compliance status, and strategic improvement initiatives
  • Own and manage the Information Security Risk Register
  • ensure risks are assessed, documented, and mitigated effectively
  • Lead compliance efforts across GDPR, PCI DSS, and other applicable regulations
  • Conduct and coordinate enterprise-wide risk assessments, audits, and internal reviews
  • Champion a pragmatic, risk-based approach to security — balancing protection, productivity, and customer experience
  • Own and govern IAM standards (RBAC, joiner/mover/leaver, privileged access, MFA, SSO) across corporate, store and customer-facing platforms
  • Oversee operational security activities, including threat detection, vulnerability management, and incident response
What we offer
What we offer
  • Generous 50% staff discount so you can treat yourself to the latest products, and a bargain staff shop on site
  • Reducing Islanders everyday expenses through discounts, benefits, financial advice, wellbeing solutions and more through Reward Gateway
  • A free onsite gym, subsidised restaurant & café to fill you needs
  • Various social events to socialise throughout the year
  • Every family is unique, we support Islanders with all different family setups enhanced maternity, paternity, adoption & fertility treatment
  • We also work closely with the Retail Trust to create dedicated support for all our Islanders
  • Flexible working is a given, on top of payday and summer early finish Fridays
  • Give as you earn scheme, a ‘Giver Island’ day each year and receive matched funding
  • Support with upskilling through on the job training and qualifications
  • A succession plan if you want to progress
  • Fulltime
Read More
Arrow Right