Job Description

Key Responsibilities

  • Simulate real-world attacker tactics, techniques, and procedures (TTPs) to assess and improve the security posture of applications, APIs, and infrastructure.
  • Identify, exploit, and document vulnerabilities in products and supporting systems using both manual techniques and automated tools.
  • Develop and execute custom attack scenarios, including phishing, social engineering, and lateral movement campaigns, to test organizational defenses.
  • Prepare comprehensive assessment reports, including reproduction steps and actionable remediation guidance for engineering teams.
  • Stay current with the latest security threats, adversary methodologies (e.g., MITRE ATT&CK framework), and offensive security tooling.
  • Assist in simulating adversary attacks to identify vulnerabilities and logic flaws in web and product features.
  • Help develop automation scripts, tools, and documentation to s...

Ready to Apply?

Take the next step in your AI career. Submit your application to Cloud Software Group today.

Submit Application