Manager, Offensive Security

SOC Ann Arbor, Michigan Alpharetta, Georgia Pennsylvania Connecticut New Hampshire Georgia Atlanta, Georgia Stamford, Connecticut Charlotte, North Carolina Rockport, Maine

Come join our passionate team! Barracuda is a leading cybersecurity company providing complete protection against complex threats. Our platform protects email, data, applications, and networks with innovative solutions, and a managed XDR service, to strengthen cyber resilience. Hundreds of thousands of IT professionals and managed service providers worldwide trust us to protect and support them with solutions that are easy to buy, deploy, and use. 
 
We know a diverse workforce adds to our collective value and strength as an organization.  Barracuda Networks is proud to be an Equal Opportunity Employer, committed to equal employment opportunity and equitable compensation regardless of race, gender, religion, sex, sexual orientation, national origin, or disability. 
 
Envision Yourself at Barracuda:
 
Barracuda is seeking a Manager, Offensive Security to lead a team of cybersecurity engineers focused on threat detection and attack stimulation across a wide range of technologies, including SaaS, endpoint, network, and cloud platforms. In this role, you will play a critical part in driving detection innovation, engineering processes, and attack and defend lifecycle for Barracuda XDR.
 
This is a unique opportunity to blend security operations, data engineering, detection engineering, offensive security and leadership in a global 24x7 Security Operations Center (SOC). You will work with over 50 different data sources and lead efforts aligned with the MITRE ATT&CK framework, while fostering collaboration between red, purple, green and blue teams to advance threat detection and response along with ensuring overall improvement and enhancement of Barracuda Security Operations Center.
 
What You’ll be Working on:
 
Proactive Engineering & Detection Development
  • Lead and mentor a team of cybersecurity Engineers
  • Develop, test and tune detection rules for multiple attack vectors across cloud, network, and endpoint telemetry.
  • Design and maintain CI/CD pipelines to version and deploy detection rules.
  • Implement and manage the full lifecycle of SIEM detection rules.
  • Foster collaboration between red and purple teams to drive offensive and defensive innovation.
  • Create and execute sprint projects using Agile methodologies to improve SOC maturity and R&D efforts.
  • Implement proactive threat hunting initiatives across customer networks.
  • Guide and monitor your team through complex security incidents such as ransomware.
Attack Operations & Adversary Simulation
  • Lead adversary simulation exercises and exploit research initiatives
  • Design and execute detection testing scenarios and breach simulations
  • Conduct tabletop exercises and kill chain rehearsals
  • Develop and manage a open-source red teaming repository for attacks and stimulations
  • Develop threat modeling frameworks and campaign replay scenarios
  • Conduct and manage live “attack and defend” exercises to test detection and response readiness
Threat Hunting & Proactive Detection
  • Implement proactive threat hunting initiatives across customer networks
  • Lead efforts in identifying emerging TTPs and zero-day discovery
  • Oversee malware analysis and hunt campaigns
  • Drive trend analysis and adversary profiling initiatives
  • Manage threat publications such as blogs, webinars, and podcasts.
Strategic Planning & Operations
  • Drive strategic planning, goal setting, and roadmap execution.
  • Ensure key SOC metrics, SLAs, and detection performance standards are met.
  • Coordinate and maintain a global 24x7x365 on-call schedule.
  • Provide regular reporting and weekly metrics related to Level 5 operations.
  • Serve as a key point of escalation for critical security incidents.
  • Lead implementation of new rules based on evolving vulnerabilities and adversary TTPs.
Innovation and R&D 
  • Lead R&D for emerging use cases, tools, and integration efforts.
  • Guide to the evaluation and adoption of new technologies aligned with future-facing cyber defense.
  • R&D around use of AI and automation for offensive security.

What You Bring To The Role:

  • 6+ years in security operations, detection engineering and offensive security
  • 2-3 years in leadership experience managing high-performing cybersecurity teams.
  • 3–4 years of hands-on experience with Python and SQL.
  • Experience with Kali and other pentesting/hacking tools
  • Developed and managed lab environments for attack and defend exercises
  • Bachelor’s or master's degree in Cybersecurity, Information Security, or related field.
  • Strong understanding of cloud platforms (AWS, Azure, GCP).
  • Experience with SIEMs like Elastic and Databricks, including advanced detection implementation.
  • Familiarity with Windows, Unix, and Linux systems.
  • Experience with threat intelligence platforms (e.g., Anomali, Cybersixgill).
  • Strong verbal and written communication skills.
  • Demonstrated ability to work across global time zones (U.S. East, India and Ireland teams).
  • Strong project management, problem-solving, and decision-making skills.
  • Ability to lead during high-pressure cybersecurity incidents and guide team response.
What you’ll get from us: 
 
A team where you can voice your opinion, make an impact, and where you and your experience are valued. Internal mobility – there are opportunities for cross training and the ability to attain your next career step within Barracuda.  
  • Equity, in the form of non-qualifying options 
  • High-quality health benefits 
  • Retirement Plan with employer match 
  • Career-growth opportunities 
  • Flexible Time Off and Paid Time Off benefits 
  • Volunteer opportunities

 

#LI-remote

Job ID 27-0029