The point where experts and best companies meet
Share
Key job responsibilities- Creating detailed engagement plans, performing operations, and emulating adversary tactics, techniques, and procedures (TTPs).
- Thoroughly documenting timelines, attack paths, findings/gaps, and recommendations.
- Bachelor's degree in computer science or equivalent
- 3+ years of programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language experience
- 3+ years of experience on a Red Team
- 2+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience
- Experience with AWS products and services
- Experience with common offensive security tools (e.g. Cobalt Strike, Metasploit, Burp Suite)
These jobs might be a good fit