Description

Required Skills & Experience:
·        Identifies threat vectors unique to the cyber-attack surface.
Requires deep knowledge of attack vectors, exploits, network protocols, and common mistakes
·        Experience emulating adversary tactics, techniques, and procedures
·        Conducting penetration tests against corporate assets
·        Building and executing proof-of-concept exploits
·        Experience with Hunt and SOC disciplines to hone detections
·        Experience with Cloud, Embedded, Linux, Physical, Windows devices

Education

Any Graduate