What makes the role special

As a Red Team Specialist, you will play a crucial role in safeguarding our clients by identifying vulnerabilities and simulating real-world attacks. This role is designed for a seasoned professional who excels in offensive security techniques and thrives in challenging environments. You will be part of a dynamic team that pushes the boundaries of cybersecurity, working closely with clients to enhance their security posture through advanced penetration testing and red teaming activities.

Tasks to solve

  • Conduct comprehensive red team engagements
  • Advance internal research and development

This role is perfect for you if

  • At least 3 years of experience in Offensive Security
  • Strong technical background in computer networks, operating systems and programming
  • Experience in gaining initial access (both through technical means and social engineering campaigns)
  • Evasion experience (systems, applications and network exploitation in heavily monitored and protected environments)
  • Proficiency in Malware development including, writing shellcode loaders, obfuscating and customizing commonly used pentest and red teaming tools)
  • Hands-on experience with operating both open-source and commercial C2 frameworks.
  • Strong scripting skills in one or more languages (Python, Go, Powershell, Bash, Ruby, Perl, Lua)

What else we appreciate in our team

  • Experienced in Blue team detection and response procedures and capabilities knowledge
  • Strong programming skills in one or more enterprise languages (C#, Java, Swift, Objective C, PHP)
  • Strong programming skills in one or more low-level languages (Asm, C/C++,Rust, Nim)
  • Strong reverse engineering and vulnerability research skills
  • Specialized knowledge such as OT, SS7 and IoT networks, embedded systems, machine learning
  • Professional Certifications such as OSEP , CRTO etc
  • Experienced in public researches, written tools, and has represented companies in trade shows / conference
  • Have previously discovered vulnerabilities with critical impact or in commonly used products