we are looking for a hands-on Penetration Tester / Red Teamer with strong infrastructure experience to join our team as a Cyber Security Researcher. Youll be part of the offensive team that researches cutting-edge attacks and translates them into realistic breach simulations across complex environments-Windows domains, cloud infrastructure, Linux systems, and more.
Your work directly powers our Exposure Validation platform, helping organizations understand and defend against modern adversaries.
What You Will Do?
Research & Simulate Real-World Attacks
Track and analyze the latest attacker TTPs
Build internal tools, scripts, and POCs to emulate real threat behavior
Design offensive simulations mapped to the MITRE ATT&CK framework
Focus areas include:
Active Directory attacks (on-prem & Azure)
Cloud infrastructure misconfigurations (AWS, Azure, GCP)
Linux and network-level attack vectors
Kubernetes threats and container-based environments
Write clean, reusable, and documented code in Python, PowerShell, and Bash
Requirements: Proven background in infrastructure penetration testing or red teaming (not web-only)
Hands-on with Windows AD exploitation, network pivoting, lateral movement
Comfortable working across the entire attack chain-from recon to post-exploitation
Tool Proficiency
Experience with tools like BloodHound, Mimikatz, Metasploit, Cobalt Strike
Familiarity with attacker tradecraft and simulation tools
Scripting & Automation
Proficient in:
Python - for automation and tooling
PowerShell - for Windows attack scenarios
Bash - for Linux environments and scripting
Cloud & Linux Experience
Worked in Linux-based systems during offensive operations
Familiarity with cloud environments: AWS, Azure, GCP (attacks or research)
This position is open to all candidates.