We are looking for a hands-on Penetration Tester / Red Teamer with strong infrastructure experience to join our team as a Cyber Security Researcher. Youll be part of the offensive team that researches cutting-edge attacks and translates them into realistic breach simulations across complex environmentsWindows domains, cloud infrastructure, Linux systems, and more.
Your work directly powers our Exposure Validation platform, helping organizations understand and defend against modern adversaries.
What You Will Do?
Research & Simulate Real-World Attacks.
Track and analyze the latest attacker TTPs.
Build internal tools, scripts, and POCs to emulate real threat behavior.
Design offensive simulations mapped to the MITRE ATT&CK framework.
Focus areas include:
Active Directory attacks (on-prem & Azure).
Cloud infrastructure misconfigurations (AWS, Azure, GCP).
Linux and network-level attack vectors.
Kubernetes threats and container-based environments.
Write clean, reusable, and documented code in Python, PowerShell, and Bash.
Requirements: Offensive Infrastructure Security Experience:
Proven background in infrastructure penetration testing or red teaming (not web-only)
Hands-on with Windows AD exploitation, network pivoting, lateral movement
Comfortable working across the entire attack chainfrom recon to post-exploitation.
Tool Proficiency:
Experience with tools like BloodHound, Mimikatz, Metasploit, Cobalt Strike.
Familiarity with attacker tradecraft and simulation tools.
Scripting & Automation.
Proficient in:
Python for automation and tooling.
PowerShell for Windows attack scenarios.
Bash for Linux environments and scripting.
Cloud & Linux Experience.
Worked in Linux-based systems during offensive operations.
Familiarity with cloud environments: AWS, Azure, GCP (attacks or research).
Bonus Points:
Used LLMs (like ChatGPT) for research or tooling enhancement.
Created internal labs, written attack POCs, or contributed to open-source offensive tooling.
Who You Are:
An attacker mindset: creative, curious, and always digging deeper.
Experienced enough to operate independentlybut still a team player.
Able to research, prototype, and write production-grade offensive content.
This position is open to all candidates.