Job Summary
****Please note that this position is based in The Middle East, Expatriation Benefits Apply!***
The Purple Team Specialist bridges the gap between Red Team (offensive security) and Blue Team (defensive security) functions to continuously improve an organization’s cyber?defence capabilities. This role focuses on validating real-world threats, improving detection and response, and ensuring security controls are effective against current attack techniques.
The specialist collaborates closely with security operations, threat intelligence, and vulnerability management teams to emulate adversary behavior and translate findings into measurable defensive improvements.
Key Responsibilities Purple Team Operations
- Plan, execute, and coordinate purple team exercises, combining red team attack simulations with blue team detection and response activities
- Emulate real-world adversary tactics using frameworks such as MITRE ATT&CK
- Continuously validate the effectiveness of security controls across people, processes, and technology
Detection & Response Improvement
- Test and tune SIEM, EDR/XDR, NDR, SOAR, and logging capabilities
- Identify detection gaps and provide actionable recommendations to improve alert fidelity and coverage
- Work with SOC analysts to enhance playbooks, alerts, and response workflows
Threat Emulation & Intelligence
- Stay current with emerging threats, attacker tradecraft, and campaign techniques
- Translate threat intelligence into practical testing scenarios
- Assist in prioritizing risks based on realistic attack paths and business impact
Collaboration & Knowledge Transfer
- Act as a liaison between Red Team, Blue Team, SOC, Incident Response, and Engineering teams
- Provide hands-on coaching, workshops, and post-exercise debriefs
- Produce clear technical reports and executive-ready summaries of findings
Reporting & Metrics
- Document attack paths, detections, misses, and response outcomes
- Define and track metrics such as detection coverage, mean time to detect (MTTD), and mean time to respond (MTTR)
- Support continuous improvement of the organization’s security maturity
Required Skills & Experience Technical Skills
- Strong understanding of offensive security techniques (e.g., phishing, lateral movement, privilege escalation, persistence)
- Strong understanding of defensive security operations and SOC workflows
- Hands-on experience with:
- SIEM platforms (e.g., Microsoft Sentinel, Splunk, QRadar)
- Endpoint security solutions (EDR/XDR)
- Log analysis and detection engineering
- Solid knowledge of:
- Networking, Windows, Linux, and Active Directory
- Cloud security concepts (Azure, AWS, or GCP preferred)
Experience
- 3–7 years of experience in cybersecurity roles such as:
- SOC Analyst
- Threat Hunter
- Red Team / Blue Team Engineer
- Detection Engineer
- Experience participating in or running security exercises, simulations, or adversary emulations
Certifications (Preferred, Not Mandatory)
- OSCP, OSCE, CRTO
- GCED, GCIA, GCIH
- CISSP, CISM
- Microsoft Security certifications (e.g., SC?200, SC?100)
Soft Skills
- Strong analytical and problem-solving abilities
- Ability to clearly explain technical findings to both technical and non-technical audiences
- Collaborative mindset with a focus on improvement rather than blame
- Curiosity and commitment to continuous learning
Success Metrics
- Improved detection coverage mapped to MITRE ATT&CK
- Reduced detection and response times
- Increased effectiveness of SOC alerts and playbooks
- Clear, actionable outcomes from purple team exercises