Develop sophisticated malware and exploit tools to simulate real-world cyber-attacks against our systems and networks.
Conduct in-depth research to identify new vulnerabilities and develop custom exploits.
Collaborate with the Red Team to plan and execute complex penetration testing and red team engagements.
Create and maintain documentation for developed malware and exploits, including mitigation and defense strategies.
Continuously update and improve attack methodologies to remain ahead of evolving security measures.
Provide technical guidance and support to other team members in exploit development and malware creation.
Analyze and replicate tactics, techniques, and procedures (TTPs) used by real-world adversaries.
Write tools to automate assessment tasks and improve work efficiency.
Requirements
Minimum 3 years of direct security experience.
Proven experience in offensive security, particularly in malware and exploit development.
Strong programming skills in languages such as C, C++, Python, or Assembly.
Advanced knowledge in internals of Windows or Unix/Linux operating system.You are not required to be an expert in both OS but you have to be an expert in at least one.
Solid understanding of various protocols from the application layer to the Ethernet layer.
Familiar with various network topologies and standards such as LAN/WAN/VPN/Wireless LAN.
Experience with reverse engineering, vulnerability research, and exploit development.
Familiar with SRE tools (IDA, Ghidra, etc) and debugger tools (GDB, Windbg)
Familiarity with common defensive technologies (eg: EDR, Antivirus, IDS, IPS, etc) and how to evade them.
Ability to work both independently and collaboratively in a fast-paced, dynamic environment.
Excellent problem-solving skills and a creative approach to challenging security scenarios.
Soft Skills
Good command in both Written and Spoken English.
An ability to work under a dynamic environment and remotely.
Good team player.
Able to work under pressure with positive attitude towards the team.