- Lead and Help team deliver penetration testing and other related security
activities
- Develop operational standards of excellence
- Training schedule for team
- Management of team including performance review
- Total ownership of scoping, planning and running penetration tests against
identified systems
Required Background
While professional penetration testing experience is preferred, in some cases we can
accept individuals who have worked in related cyber security professions, dependant
on aptitude and thirst for knowledge
- 4+ Years of Red Team experience (Adversary Emulation)
- 4+ Years of Infrastructure penetration testing.
- 4+ Years of Building infrastructure to support campaigns
- In depth knowledge and understanding of common C2 frameworks (e.g.
Cobalt Strike, PoshC2, Empire).
- In depth knowledge and understanding of applications and networking.
- An in-depth level of knowledge of Windows exploitation and Active Directory.
- A thirst for knowledge and a constant desire to push yourself
- Exploit creation, skills with scripting, vulnerability analysis and reverse
engineering.
- Exploit Research
- Experience working with and against many security products, ranging from
perimeter security to endpoint protection tools.
- Ability to explain basic networking concepts (routing, ACL, load balancers,
SSL/TLS, TCP) in order to provide application architecture feedback
- Development experience using Python, PowerShell, C, or C++
- Understanding of common software security issues and remediation
techniques (OWASP Top 10, SANS 25, Mitre ATT&CK, etc.)
Interested candidates kindly forward your updated CV on