we are at the forefront of cybersecurity innovation, designing and developing cutting-edge
solutions to protect our clients in an ever-evolving threat landscape. We also excel at seamlessly
integrating our unique capabilities with best-in-class products to deliver comprehensive and robust
security architectures. We are a passionate team dedicated to building a safer digital world.
We are looking for a highly motivated and skilled Red Team Offensive Member to join our dedicated
cybersecurity team. In this role, you will be a key contributor to our adversarial simulation efforts, actively
participating in Red Team operations to test and improve our organization's defensive capabilities. This
position focuses on executing realistic attack scenarios, utilizing offensive tools, and providing valuable
insights to strengthen our overall security posture.
Important note: This is a hands-on offensive role, distinct from traditional Vulnerability Assessment and
Penetration Testing (VAPT).
Responsibilities
✓ Develop, enhance, and maintain custom tools and frameworks used in red team operations.
✓ Simulate real-world attacks such as TTPs to test and improve organizational defences.
✓ Research and implement novel attack techniques, evasion methods, and post-exploitation
strategies.
✓ Collaborate with internal teams to integrate red team capabilities into broader security initiatives.
✓ Operate with stealth and precision to minimize detection and effectively test our Blue Team's
incident detection and response capabilities.
✓ Conduct various offensive activities, including network exploitation, web application attacks,
social engineering, and physical security assessments, including training.
✓ Stay up to date with emerging threats, vulnerabilities, and adversary tactics.
✓ Document methodologies, tools, and findings clearly and effectively.
✓ Continuous Learning & Improvement:
✓ Continuously enhance personal offensive security skills and knowledge by staying current with
the latest attack methodologies, tools, and threat intelligence.
✓ Participate in internal knowledge-sharing sessions and contribute to the team's collective
expertise.
Requirements
✓ Minimum of 4 years of hands-on experience in Red Teaming, Offensive Security or Malware
Development especially Fully Undetectable (FUD).
✓ Demonstrated experience in developing custom malware, payloads, or offensive tools.
✓ Strong understanding of malware behaviour, execution chains, and evading detection
(AV/EDR/EPP).
✓ Deep knowledge of Windows and/or Linux internals, memory manipulation, and exploitation
techniques.
✓ Strong understanding of attack lifecycle, TTPs (Tactics, Techniques, and Procedures), and
MITRE ATT&CK framework.
✓ Proficiency in at least one low-level or systems programming language (e.g., C/C++, Rust, Go,
Assembly).
✓ Deep knowledge of Windows and/or Linux internals and exploitation techniques.
✓ Experience with common penetration testing and red teaming tools (e.g., Metasploit, Cobalt
Strike, Sliver, Mythic, etc.). It will be excellent when you have developed your own tools.
✓ Ability to work independently, adapt quickly to new challenges, and think creatively under
constraints.
✓ Excellent communication skills and the ability to explain technical concepts clearly.
✓ Open-minded, flexible, and comfortable working in fast-paced, evolving environments.
Preferred skills and experiences:
✓ Experience with malware development, reverse engineering, or exploit development.
✓ Contributions to open-source offensive tools or frameworks.
✓ Strong understanding of x86/x64 assembly and low-level debugging.
✓ Active security clearances or certifications (e.g., OSED, OSCE, CRTO, GPEN). Certification is
optional. Impressive portfolio is more important.
Application Confirmation
You're applying for the role below: