×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Senior Offensive Security Engineer, Red Team

Job in Cincinnati, Hamilton County, Ohio, 45208, USA
Listing for: Procter & Gamble
Part Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below

Job Location

CINCINNATI GENERAL OFFICES

Job Description

Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands.

From Day 1, you’ll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative work spaces where innovation thrives and where your technical expertise is recognized and rewarded.

The

Opportunity

Are you a person who is passionate about breaking applications, devices, services and/or processes to help protect them against the world’s most advanced cyber security adversaries?

The Information Security Protect organization at P&G is responsible for providing a realistic depiction of threat actor behaviors and scenarios during simulated exercises. We drive improvements to applications and systems, as well as detection and response capabilities through regular testing of security controls across the enterprise.

Responsibilities
  • Lead end-to-end red team operations aligned to priority threat actors: scenario design, ROE, pre-briefs, execution, and hot-wash/AAR.
  • Support purple-team engagements with DFIR/SOC and Detection Engineering to convert TTPs into durable detections, runbooks, and response improvements with measurable outcomes.
  • Orchestrate assumed-breach campaigns emphasizing evasion and control bypass (EDR/AV, email/web security, identity/conditional access, network segmentation, cloud guardrails).
  • Perform campaign/TTP research, develop internal PoCs/tooling (e.g., tradecraft to exercise specific controls, lightweight payloads), and steward OPSEC.
  • Produce executive-ready risk narratives and technical reporting (ATT&CK mapping, artifacts, evidence handling) and brief senior leadership.
  • Mentor junior engineers; set standards for craft quality, methodology, and safety.
  • Coordinate multi-party/third-party exercises; manage risk, deconflict with production, and ensure stakeholder alignment.
  • Contribute to operational expansion by researching, prototyping, and developing novel capabilities for offensive use.
  • Contribute to program maturity: metrics/KPIs, roadmap, methodology standardization, control validation cadence, and integration with vulnerability management.
Job Qualifications

Required:

  • BA or BS degree in Information Security, Cyber Security, Computer Science, or related field (OR 7+ years of relevant experience required in lieu of a degree).
  • 5+ years running offensive or emulation operations in large/complex environments, with demonstrated impact on detections/response.
  • Expertise across 2+ domains: enterprise/web/mobile apps; identity; cloud (AWS/GCP/Azure); network/endpoint;
    IoT/OT; or directory services.
  • Proven ability to bypass preventative/detective controls and reach mission objectives while maintaining safety and ROE.
  • Strong engineering skills (Python, Power Shell, GO, C++, Web Frameworks); comfort with low-level concepts a plus) and familiarity with C2 tradecraft.
  • Deep command of MITRE ATT&CK and threat-informed defense; history partnering with DFIR/SOC and Detection Engineering.
  • Excellent executive and technical communication.
  • Ability to work in Cincinnati, Ohio based office 3 days per week.

Preferred:

  • Leadership of purple-team campaigns and incident-driven emulations; closed-loop improvements with measurable KPI movement.
  • Building program metrics/KPIs, standardizing reporting, and integrating with risk governance.
  • Threat-intel integration: actor/campaign analysis, hypothesis generation, and prioritization tied to business impact.
  • Identity and cloud attack paths (SSO, MFA, OAuth, PAM; AWS/GCP/Azure control planes) with hardening collaboration across platform/IDAM teams.
  • Coordinating large third-party exercises and setting complex…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary