We are looking for a red team operator to be part of our offensive security team
Key Responsibilities responsibilities
Execute Red Team engagements in a variety of networks using real-world adversarial Tactics, Techniques, and Procedures (TTPs).
Develop payloads, scripts, and tools that weaponize new proof-of-concepts for exploitation, evasion, and lateral movement
Execute penetration tests on various platforms (infrastructure, web, and mobile) to identify security flaws
Perform social engineering assessments (email phishing, vishing, physical access attacks) to simulate the theft of passwords, infiltrate systems, and download malware
Work with other offensive security team members on developing tools,internal methodologies
Qualifications
3+ years of experience in red teaming
Project experience in execution of red / purple team exercises and / or penetration testing of web and mobile applications, internal and external infrastructure
Project experience in execution of social engineering assessments.
Strong understanding of offensive security frameworks such as MITRE ATT&CK and TIBER-EU.
Experience managing/working with offensive security (red teaming) tooling such as Cobalt Strike, Empire, Havoc, Mythic, etc.
Strong Knowledge in XDR/EDR bypass
Experience in setting up red teaming Command and Control (C2) infrastructure, including proxy servers, redirectors, domain fronting, etc.
Strong
Knowledge of industry-standard security testing, penetration testing methodologies, and attack simulation tools.
Offensive security certifications is a plus but not mandatory
Creative, independent with good problem-solving skills.
Excellent written and verbal communication skills in English, with the ability to present ideas and results to technical and non-technical audiences.