Job Description
Key Responsibilities
- Simulate real-world attacker tactics, techniques, and procedures (TTPs) to assess and improve the security posture of applications, APIs, and infrastructure.
- Identify, exploit, and document vulnerabilities in products and supporting systems using both manual techniques and automated tools.
- Develop and execute custom attack scenarios, including phishing, social engineering, and lateral movement campaigns, to test organizational defenses.
- Prepare comprehensive assessment reports, including reproduction steps and actionable remediation guidance for engineering teams.
- Stay current with the latest security threats, adversary methodologies (e.g., MITRE ATT&CK framework), and offensive security tooling.
- Assist in simulating adversary attacks to identify vulnerabilities and logic flaws in web and product features.
- Help develop automation scripts, tools, and documentation to s...
Ready to Apply?
Take the next step in your AI career. Submit your application to Cloud Software Group today.
Submit Application