We are seeking a highly skilled and experienced Attack Team Leader to lead a specialized attack team focused on developing offensive, production-ready attack capabilities. This is a research and development (R&D) role at the core of our offensive security efforts. You will be responsible for architecting and delivering advanced low-level attack components used in evasion techniques, red team tooling, and adversary simulations.
You will be hands-on in both leadership and development, guiding technical direction, mentoring engineers, and contributing code to offensive attack components.
The Impact You Will Have
Lead the design, development, and deployment of production-grade offensive capabilities targeting application and OS CVEs exploits
Develop attack components for Windows/Linux including OS-level evasion mechanisms
Implement Python bindings to connect native low-level components with Python-based research tools and automation
Research and develop bypass techniques for modern security controls
Collaborate with the Research Team and other R&D stakeholders to implement and refine offensive concepts
Provide technical mentorship and drive engineering best practices within the team
Harness AI coding agents to streamline the above processes
Requirements: What Sets You Apart
Leadership
Proven experience as a Team Lead or Technical Lead in an offensive security or R&D environment
Strong ability to lead complex engineering efforts and mentor a highly technical team
Experience owning full R&D project lifecycles from concept through production
Technical Expertise
5+ years of hands-on experience in development of offensive attack components
3+ years of Python experience, especially for integrating with native modules and supporting research workflows
Experience developing stealthy and evasive attack components, including in-memory execution and user/kernel-mode tooling
Familiarity with EDR evasion, API hooking, and direct system call manipulation
Personal Attributes
Passionate about offensive security and deep technical research
Passionate about AI coding agents
Self-motivated and capable of operating independently in high-trust environments
Creative and methodical in problem solving, with a strong attention to detail
Even BETTER if you have
Deep knowledge of Windows/Linux APIs, security controls, and undocumented behaviors relevant to offensive security
Experience with MITRE ATT&CK and implementing or simulating ATT&CK techniques
Background in red teaming, adversary emulation, or APT simulation
Prior contributions to offensive tooling or internal R&D platforms
Understanding of modern threat actor TTPs and practical application in research environments
This position is open to all candidates.