Senior Security Validation Engineer – Breach & Attack Simulation (BAS)

Riyadh Tax Free3 days agoFull-time External
Negotiable
We are seeking a highly skilled Security Validation Engineer to operate and manage the AttackIQ Breach & Attack Simulation (BAS) platform. The role is responsible for continuously validating the effectiveness of the bank’s security controls by simulating real-world cyber-attacks and mapping results against the MITRE ATT&CK framework. This position works closely with SOC, Incident Response, and Security Engineering teams to identify detection gaps and strengthen the organization’s defensive posture. Key Responsibilities • Operate, manage, and maintain the AttackIQ BAS platform. • Design, execute, and manage continuous and scheduled attack simulations across network, endpoint, cloud, and hybrid environments. • Validate the effectiveness of security controls including NDR, XDR, EDR, SOAR, firewalls, and SIEM. • Map attack simulation results to the MITRE ATT&CK framework to identify coverage gaps and control weaknesses. • Collaborate closely with SOC and Incident Response teams to improve detection, response, and remediation strategies. • Analyze simulation outcomes and provide actionable remediation recommendations. • Prepare and deliver monthly executive and technical reports on security control effectiveness and risk exposure. • Support continuous improvement initiatives for security validation and threat detection capabilities. Required Experience & Qualifications • 3+ years of hands-on experience in Breach & Attack Simulation (BAS), security validation, red teaming, or adversary emulation. • Practical experience with AttackIQ or similar BAS platforms. • Strong working knowledge of the MITRE ATT&CK framework. • Experience operating in enterprise or financial-sector environments is highly preferred. • Solid understanding of modern cyber threats, attack techniques, and defensive controls. Technical Skills • AttackIQ scenario creation, execution, and customization. • MITRE ATT&CK technique mapping and gap analysis. • Strong understanding of adversary TTPs (Tactics, Techniques, and Procedures). • Knowledge of NDR, XDR, EDR, SOAR, SIEM, and firewall technologies. • Ability to analyze security telemetry and translate findings into business-focused insights.