JOBSEARCHER

Manager, Offensive Security - remote

Come join our passionate team! Barracuda is a leading cybersecurity company providing complete protection against complex threats. Our platform protects email, data, applications, and networks with innovative solutions, and a managed XDR service, to strengthen cyber resilience. Hundreds of thousands of IT professionals and managed service providers worldwide trust us to protect and support them with solutions that are easy to buy, deploy, and use.We know a diverse workforce adds to our collective value and strength as an organization.  Barracuda Networks is proud to be an Equal Opportunity Employer, committed to equal employment opportunity and equitable compensation regardless of race, gender, religion, sex, sexual orientation, national origin, or disability.Envision Yourself At BarracudaBarracuda is seeking a Manager, Offensive Security to lead a team of cybersecurity engineers focused on threat detection and attack stimulation across a wide range of technologies, including SaaS, endpoint, network, and cloud platforms. In this role, you will play a critical part in driving detection innovation, engineering processes, and attack and defend lifecycle for Barracuda XDR.This is a unique opportunity to blend security operations, data engineering, detection engineering, offensive security and leadership in a global 24x7 Security Operations Center (SOC). You will work with over 50 different data sources and lead efforts aligned with the MITRE ATT&CK framework, while fostering collaboration between red, purple, green and blue teams to advance threat detection and response along with ensuring overall improvement and enhancement of Barracuda Security Operations Center.What You’ll Be Working OnProactive Engineering & Detection DevelopmentLead and mentor a team of cybersecurity EngineersDevelop, test and tune detection rules for multiple attack vectors across cloud, network, and endpoint telemetry.Design and maintain CI/CD pipelines to version and deploy detection rules.Implement and manage the full lifecycle of SIEM detection rules.Foster collaboration between red and purple teams to drive offensive and defensive innovation.Create and execute sprint projects using Agile methodologies to improve SOC maturity and R&D efforts.Implement proactive threat hunting initiatives across customer networks.Guide and monitor your team through complex security incidents such as ransomware.Attack Operations & Adversary SimulationLead adversary simulation exercises and exploit research initiativesDesign and execute detection testing scenarios and breach simulationsConduct tabletop exercises and kill chain rehearsalsDevelop and manage a open-source red teaming repository for attacks and stimulationsDevelop threat modeling frameworks and campaign replay scenariosConduct and manage live “attack and defend” exercises to test detection and response readinessThreat Hunting & Proactive DetectionImplement proactive threat hunting initiatives across customer networksLead efforts in identifying emerging TTPs and zero-day discoveryOversee malware analysis and hunt campaignsDrive trend analysis and adversary profiling initiativesManage threat publications such as blogs, webinars, and podcasts.Strategic Planning & OperationsDrive strategic planning, goal setting, and roadmap execution.Ensure key SOC metrics, SLAs, and detection performance standards are met.Coordinate and maintain a global 24x7x365 on-call schedule.Provide regular reporting and weekly metrics related to Level 5 operations.Serve as a key point of escalation for critical security incidents.Lead implementation of new rules based on evolving vulnerabilities and adversary TTPs.Innovation and R&D Lead R&D for emerging use cases, tools, and integration efforts.Guide to the evaluation and adoption of new technologies aligned with future-facing cyber defense.R&D around use of AI and automation for offensive security.What You Bring To The Role6+ years in security operations, detection engineering and offensive security2-3 years in leadership experience managing high-performing cybersecurity teams.3–4 years of hands-on experience with Python and SQL.Experience with Kali and other pentesting/hacking toolsDeveloped and managed lab environments for attack and defend exercisesBachelor’s or master's degree in Cybersecurity, Information Security, or related field.Strong understanding of cloud platforms (AWS, Azure, GCP).Experience with SIEMs like Elastic and Databricks, including advanced detection implementation.Familiarity with Windows, Unix, and Linux systems.Experience with threat intelligence platforms (e.g., Anomali, Cybersixgill).Strong verbal and written communication skills.Demonstrated ability to work across global time zones (U.S. East, India and Ireland teams).Strong project management, problem-solving, and decision-making skills.Ability to lead during high-pressure cybersecurity incidents and guide team response.What You’ll Get From UsA team where you can voice your opinion, make an impact, and where you and your experience are valued. Internal mobility – there are opportunities for cross training and the ability to attain your next career step within Barracuda.Equity, in the form of non-qualifying options High-quality health benefits Retirement Plan with employer match Career-growth opportunities Flexible Time Off and Paid Time Off benefits Volunteer opportunitiesJob ID 27-0029