7+ years of IT experience with at least 5 years of experience in offensive security.
Must have experience and be very proficient with the common tools associated with red teaming (Mythic, Havoc, Cobalt Strike and Sliver etc.)
Must have experience in developing implants and evading common security tools.
Must have a solid understanding of voice and data networks, major operating systems, active directory, and their associated peripherals, along with MITRE ATT&CK TTPs.
Must demonstrate knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
Must be able to critically examine an organization and system through the perspective of a threat actor and articulate risk in clear, precise terms.
Must be able to both work independently as well as effectively work in teams with individuals with a variety of skills and backgrounds
Must have a strong background using low-level languages (C/C++).
Must have experience with PE file format and low-level Windows internals.
Must have experience with reverse engineering and Windows debugging (IDA, Ghidra and WinDBG).
Desired Skills
Previous contributions to the community through open-source, conference presentations or public disclosures a plus
Previous experience working in the financial industry a plus.