A cyber stable startup with paying customers is looking for a Cyber Researcher Specialist and Content Creator Manager with a deep understanding of both information security and Computer Science. The right person will lead our cyber content team, to help us build the most advanced cyber training and assessment platform. You will be responsible for creating an advanced training session including enterprise grade environment, red and blue adversaries automation. This position is seeking an all-rounder team member to join an innovative startup.
Requirements:
5-7 years of experience leading penetration testing, application testing, and red team engagements
Experience with security tools such as Nmap, Metasploit, Kali Linux, Burp Suite Pro, etc., as well as other various commercial and self-developed testing tools
Experience with scripting languages such as Python, ruby, POSIX shell, as well as familiarity with programming languages such as: C / C ++/ObjC/ C #, JAVA, PHP, or.NET
Detailed technical knowledge in multi-security domains (Web, Network, OS, DB, IoT, Cloud, SCADA- advantage)
Understanding of the threat landscape, attack vectors, new vulnerabilities, and cyber tools, creating simulation of real-world cyber scenarios.
Knowledge in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
5-7 years of experience leading penetration testing, application testing, and red team engagements
Experience with security tools such as Nmap, Metasploit, Kali Linux, Burp Suite Pro, etc., as well as other various commercial and self-developed testing tools
Experience with scripting languages such as Python, ruby, POSIX shell, as well as familiarity with programming languages such as: C / C ++/ObjC/ C #, JAVA, PHP, or.NET
Detailed technical knowledge in multi-security domains (Web, Network, OS, DB, IoT, Cloud, SCADA- advantage)
Understanding of the threat landscape, attack vectors, new vulnerabilities, and cyber tools, creating simulation of real-world cyber scenarios.
Knowledge in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc.
This position is open to all candidates.