Massachusetts Veterans Jobs

MassHire JobQuest Logo

Job Information

MassMutual Offensive Security Analyst in Springfield, Massachusetts

Why we need you.

We’re growing and our clients deserve the best. As an Offensive Security Analyst you will have the opportunity to work in a thriving and robust environment in the specialty areas of exploitation assessment and vulnerability & assessment management. You will do so by partnering closely with our Security Intelligence and Threat and Vulnerability Assessment (TVA) teams. You will leverage real and current adversarial techniques against our own network based on the latest threats in red team and purple team assessments! In this role, as well as all roles within MassMutual, you will demonstrate accountability, agility, a dedication to be inclusive, a strong business acumen, and will show courage, even in the most difficult situations. We also highly value strong communication skills, a passion for learning, leadership traits, resilience and self-awareness.

Does this role sound like what you are looking for? Do you believe you would be a great fit?

Below are the lists of tasks candidates will be able to perform, knowledge you should have, and skills & abilities that you can bring into our Offensive Security Analyst role!


  • Identify vulnerabilities and exposure within enterprise networks, systems, and applications

  • Lead or enable exploitation operations in support of organization objectives and target requirements

  • Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).

  • Provide recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g. protection of information, systems and processes).

  • Provide technical documents, incident reports, video recorded descriptions, findings from computer examinations, summaries, and other situational awareness information to relevant stakeholders

  • Conduct and/or support authorized penetration testing on enterprise network assets.

  • Perform penetration testing as required for new or updated applications.

  • Review the security status of a system (including the effectiveness of security controls) on an ongoing basis to determine whether the risk remains acceptable.

  • Provide recommendations for how to improve the controls based on test scenario findings

  • Create and conduct custom table top exercises

  • Partner with other teams on alert development to create new alerts and identify gaps in alerting.

  • Analyze Threat Trends to identify indicators of compromise (IOCs)

  • Develop your own test scenarios by performing threat hunts and ethical hack tests

  • Identify control gaps that allow threats to enter our network

  • Design and develop new tools/technologies as related to cybersecurity.

  • Develop specific cybersecurity countermeasures and risk mitigation strategies for systems and/or applications.

  • Exploit network devices, security devices, and/or terminals or environments using various methods or tools.

  • Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.

  • Test and evaluate locally developed tools for operational use.

  • Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities.

  • Perform analysis for target infrastructure exploitation activities.

  • Conduct exploitation of wireless computer and digital networks.

  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Knowledge of/in:

  • Data compromise/destruction, covert communications, encryption attacks and more

  • Detection Engineering framework

  • Understanding of cloud technologies

  • Understanding of the cybersecurity external landscape

  • Functions and capabilities of internal teams that emulate threat activities to benefit the organization.

  • Ethical hacking principles and techniques.

  • Cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)

  • System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

  • Attack methods and techniques (DDoS, brute force, spoofing, etc.).

  • Adversarial tactics, techniques, and procedures.

Skill in/of:

  • Hunting in response to an incident

  • Providing Offensive security as a service simultaneously to multiple customers

  • Identifying gaps in technical capabilities.

  • Researching vulnerabilities and exploits utilized in traffic.

  • Writing (and submitting) requirements to meet gaps in technical capabilities

  • Use of penetration testing tools and techniques

  • Performing impact/risk assessments.

  • Control testing

  • Supporting clients in consulting engagement model

Ability to:

  • Think like an adversary

  • Learn multiple network infrastructures

  • Support client in a consulting engagement model

  • Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means

  • Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

  • Evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

  • Identify/describe target vulnerability.

  • Identify/describe techniques/methods for conducting technical exploitation of the target.

  • Identify systemic security issues based on the analysis of vulnerability and configuration data.

Additional Requirements:

  • GCDA or GCPN or OSCP or GXPN certified.



At MassMutual, we focus on ensuring fair, equitable pay by providing competitive salaries, along with incentive and bonus opportunities for employees. Your total compensation package includes either a bonus target or in a sales-focused role a Variable Incentive Compensation component.

MassMutual is an Equal Employment Opportunity employer Minority/Female/Sexual Orientation/Gender Identity/Individual with Disability/Protected Veteran. We welcome all persons to apply. Note: Veterans are welcome to apply, regardless of their discharge status.

If you need an accommodation to complete the application process, please contact us ( and share the specifics of the assistance you need.