Senior Manager Information Security; Red team lead
Job in
Richardson, Dallas County, Texas, 75080, USA
Listed on 2026-02-16
Listing for:
Celestica Inc.
Full Time
position Listed on 2026-02-16
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Systems Engineer
Job Description & How to Apply Below
General Overview
Functional Area:
Information Technology (ITM)
Career Stream: IT Risk & Compliance (RAC)
Role:
Senior Manager (SMG)
Job Title:
Senior Manager, Information Security
Job Code: SMG-ITM-SECR
Job Level: Level 11
Direct/Indirect Indicator:
Indirect
Performs tasks such as, but not limited to, the following:
- Security Policy & Architecture Review
- Review organizational security policies, standards, and procedures and analyze the existing cybersecurity architecture (network, cloud, endpoint, and application) to identify design flaws, misconfigurations, or logic gaps that could be exploited by insiders or external attackers.
- Collaborate with security architects and engineering teams to recommend structural improvements that reduce the attack surface.
- Design and execute continuous control validation programs to test the efficacy of security tools (e.g., EDR, SIEM, Firewalls, DLP).
- Perform proactive "purple team" exercises and threat hunts to identify silent failures in detection logic or blocking mechanisms.
- Simulate real-world attack scenarios (e.g., lateral movement, data exfiltration, privilege escalation) to validate if existing controls trigger appropriate alerts and blocks.
- Translate findings from architecture reviews and validation tests into actionable remediation plans.
- Work cross-functionally with IT, Dev Ops, and GRC teams to close identified security gaps, ensuring that "quick fixes" do not introduce new risks.
- Track and report on the "Time to Detect" and "Time to Remediate" metrics to demonstrate continuous improvement in the organization’s defensive posture.
- Offensive Security Leadership
- Serve as the internal subject matter expert on offensive security techniques, tactics, and procedures (TTPs).
- Stay ahead of the latest threat intelligence and vulnerability disclosures to predict how they might impact the organization’s specific architecture.
- Mentor junior analysts on threat hunting methodologies and offensive security mindset.
- 8–10 years of hands-on experience in cybersecurity, with a specific focus on penetration testing, threat hunting, or security architecture.
- Proven experience in reviewing and auditing security policies and technical architectures for enterprise environments.
- Experience with Breach and Attack Simulation (BAS) tools (e.g., Attack
IQ, Cymulate) or manual emulation frameworks (e.g., Atomic Red Team, MITRE CALDERA). - Deep understanding of the MITRE ATT&CK framework and how to map specific controls to adversary tactics.
- Proficiency in scripting languages (Python, Power Shell, Bash) for automating hunts and validation tests.
- Strong knowledge of operating system internals (Windows, Linux) and network protocols (TCP/IP, DNS, HTTP/S).
- Familiarity with security control platforms (SIEM, EDR, IDS/IPS, Firewalls) and how to bypass or test them.
- Analytical Thinking:
Ability to look at a complex system and identify the weakest link. - Communication:
Ability to explain complex technical exploitation paths to non-technical stakeholders (e.g., explaining why a policy gap matters). - Integrity:
Unwavering ethical standards when conducting offensive operations against internal live systems.
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Typical Experience- 8–10 years of hands-on experience in cybersecurity, with a specific focus on penetration testing, threat hunting, or security architecture.
- Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or equivalent experience.
- Mandatory Offensive Security Certification:
Must hold at least one advanced certification such as OSCP (Offensive Security Certified Professional), GPEN (GIAC Penetration Tester), CEH (Certified Ethical Hacker) Practical, or CompTIA Pen Test+. - Additional certifications in security architecture (e.g., CISSP, CISM) or cloud security (e.g., CCSP, AWS Security Specialty) are highly…
Position Requirements
10+ Years
work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×