Senior Manager, Offensive Security

Pfizer Pfizer · Pharma · Thessaloniki Chortiatis, Greece

This role leads enterprise offensive security capabilities, including penetration testing, red teaming, and adversary simulation, to identify and prioritize security weaknesses in a highly regulated pharmaceutical environment. It involves partnering with detection and remediation teams to reduce risk and improve defensive outcomes.

What you'd actually do

  1. Lead the offensive security capability, including strategy, roadmap, and execution of enterprise penetration testing, red teaming, and adversary simulation activities.
  2. Plan and oversee offensive testing across applications, cloud platforms, networks, and endpoints to identify exploitable weaknesses and control gaps.
  3. Design and execute threat‑informed testing scenarios aligned to real‑world adversary tactics, techniques, and procedures.
  4. Partner with Threat Detection, Vulnerability Management, and Remediation teams to validate findings, prioritize exposures, and drive effective risk reduction.
  5. Ensure offensive security activities are safely executed, well‑governed, and aligned with legal, regulatory, and operational constraints.

Skills

Required

  • 7+ years of experience in cybersecurity
  • significant hands‑on experience in offensive security, penetration testing, or red team operations
  • Red team and adversary emulation methodologies (MITRE ATT&CK–aligned)
  • Application, cloud, network, and identity penetration testing
  • Social engineering and phishing simulations
  • Tooling and frameworks commonly used in offensive security
  • Solid understanding of modern enterprise environments (cloud, SaaS, hybrid)
  • Proven ability to communicate complex technical findings to both technical and executive audiences
  • Experience in leadership and mentoring
  • Experience operating in highly regulated, global environments
  • Demonstrated experience in an agile work environment

Nice to have

  • Experience in pharmaceutical, biotech, life sciences, or similarly regulated industries
  • Experience with cloud-native red teaming (AWS, Azure, GCP) and identity-centric attack paths
  • Familiarity with detection engineering, SIEM/SOAR, and threat intelligence workflows
  • Professional certifications such as OSCP, OSEP, CRTO, CISSP, GIAC, or similar offensive security‑focused credentials
  • Strong communication skills, with the ability to clearly articulate technical risk, attack feasibility, and business impact to senior technical and non‑technical stakeholders

What the JD emphasized

  • highly regulated pharmaceutical environment
  • highly regulated, global environments