Required Skills & Experience:
· Identifies threat vectors unique to the cyber-attack surface.
Requires deep knowledge of attack vectors, exploits, network protocols, and common mistakes
· Experience emulating adversary tactics, techniques, and procedures
· Conducting penetration tests against corporate assets
· Building and executing proof-of-concept exploits
· Experience with Hunt and SOC disciplines to hone detections
· Experience with Cloud, Embedded, Linux, Physical, Windows devices
Any Graduate