Job Description:
Job Description:
Required Skills
- 7+ years of IT experience with at least 5 years of experience in offensive security.
- Experience with designing and developing custom implants, loaders, and post-exploitation tools for red team engagements.
- Comprehensive knowledge of command-and-control frameworks like Cobalt Strike, Mythic, Havoc, and Sliver.
- Experience with researching and implementing EDR evasion techniques, including userland and kernel-level bypasses, in-memory execution, and telemetry disruption.
- Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
- Must be able to critically examine an organization and system through the perspective of a threat actor and articulate risk in clear, precise terms.
- Must be able to both work independently as well as effectively work in teams with individuals with a variety of skills and backgrounds
- Able to collaborate with other teams and communicate security concepts effectively.
- Must have a strong background using low-level languages (C/C++).
- Must have experience with PE file format and low-level Windows internals.
- Must have experience with reverse engineering and Windows debugging (IDA, Ghidra and WinDBG).
Skills:
- Advisory
- Innovative Thinking
- Technical Documentation
- Technology System Assessment
- Threat Analysis
- Adaptability
- Collaboration
- Executive Presence
- Scenario Planning and Analysis
- Test Engineering
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
1st shift (United States of America)