Our Range leverages real-world cyber attacks, which cover the entire attack kill chain. These reverse-engineered malwares are run, using our attack generator, on virtual enterprise grade networks, allowing users to defend against live attacks using commercial- security tools.
If you are looking for a job that will allow you to work with cutting-edge technologies on a cloud-based SaaS and simulation platform, in a super cool and successful company, come and join us!
Responsibilities –
Own the research and development of realistic and advanced cyber-attacks for training and simulation purposes, from ideation and requirements definition to product release.
Take part in the investigation flow definition as executed by the Blue Team.
Work alongside the R&D teams including SW developers, security analysts, DevOps and CloudOps while working on some of the most advanced security technologies and techniques.
If you are looking for a job that will allow you to work with cutting-edge technologies on a cloud-based SaaS and simulation platform, in a super cool and successful company, come and join us!
Responsibilities –
Own the research and development of realistic and advanced cyber-attacks for training and simulation purposes, from ideation and requirements definition to product release.
Take part in the investigation flow definition as executed by the Blue Team.
Work alongside the R&D teams including SW developers, security analysts, DevOps and CloudOps while working on some of the most advanced security technologies and techniques.
Requirements:
4+ years of experience in the security field (security researcher, security engineer, security architect, Redteam, IR or pen testing). A must
Strong SaaS security skills, with a focus on one of – AWS, Azure, GCP A must
Deep understanding of cyber security attack vectors, vulnerabilities, developing POCs and exploits A must
A degree in computer science or related technical orientation An advantageOR +3 years of proven experience in the security field
1+ year of proven experience in multiple languages – C#, PowerShell, Python
Ability to identify, mitigate, and explain attack flows.
Proven experience and knowledge with Windows and Linux OS An advantage
Strong theoretical knowledge of security considerations of cloud computing including data breaches, hacking, account hijacking, malicious insiders, third parties, authentication, APTs, data loss, Identity and access and OWASP attacks.
Proven experience in multiple languages – C, CPP, Go lang an advantage.
Have the ability to work independently as well as in a team
4+ years of experience in the security field (security researcher, security engineer, security architect, Redteam, IR or pen testing). A must
Strong SaaS security skills, with a focus on one of – AWS, Azure, GCP A must
Deep understanding of cyber security attack vectors, vulnerabilities, developing POCs and exploits A must
A degree in computer science or related technical orientation An advantageOR +3 years of proven experience in the security field
1+ year of proven experience in multiple languages – C#, PowerShell, Python
Ability to identify, mitigate, and explain attack flows.
Proven experience and knowledge with Windows and Linux OS An advantage
Strong theoretical knowledge of security considerations of cloud computing including data breaches, hacking, account hijacking, malicious insiders, third parties, authentication, APTs, data loss, Identity and access and OWASP attacks.
Proven experience in multiple languages – C, CPP, Go lang an advantage.
Have the ability to work independently as well as in a team
This position is open to all candidates.