to join our elite security research and red-team operations unit.
In this role, you will simulate real-world cyberattacks, build offensive security tools, uncover advanced vulnerabilities, and support intelligence teams by analyzing threat actors and their TTPs (Tactics, Techniques, and Procedures).
This position is ideal for professionals with expertise in adversarial simulations, malware development (maldev), exploit research, and advanced penetration testing.
Key ResponsibilitiesOffensive Security & Red Team Operations
Plan and execute full-scope red team engagements across networks, applications, cloud, wireless, and social engineering vectors.
Develop custom offensive tools, exploits, payloads, and proof-of-concept attack modules.
Conduct adversary emulation based on MITRE ATT&CK, threat intelligence, and real-world campaigns.
Perform malware analysis, malware development (maldev), and reverse engineering to evaluate organizational resilience.
Vulnerability Research & Exploit Development
Identify, analyze, and exploit vulnerabilities across Windows, Linux, Android, Web, and Cloud environments.
Perform fuzzing, static/dynamic analysis, and offensive R&D for zero-day discovery.
Build custom scripts and automation frameworks for exploit development and testing.
Threat Intelligence Collaboration
Work with internal intelligence teams to track and model APT groups, cybercrime operations, and emerging attack techniques.
Convert threat intelligence into offensive capabilities, detection gap analysis, and defensive improvements.
Reporting & Security Recommendations
Produce detailed technical reports with exploit chains, vulnerabilities, attack paths, and remediation guidance.
Participate in purple team operations to help defensive teams validate detection and response coverage.
Required Technical SkillsCore Offensive Skills
Strong experience in penetration testing, red teaming, and adversary simulation.
Proficiency in malware development (maldev) and payload engineering.
Hands-on expertise with reverse engineering tools such as IDA Pro, Ghidra, x64dbg, OllyDbg, and Radare2.
Deep understanding of Windows internals, Linux internals, and Android security.
Exploit Development
Solid knowledge of buffer overflows, ROP chains, heap exploitation, and memory corruption.
Experience working with fuzzing tools (AFL, Peach, Hongfuzz).
Proficiency in Assembly, C/C++, Python, or Go.
Tools & Frameworks
Offensive frameworks: Metasploit, Cobalt Strike, Sliver, Empire.
Scripting and payload tools: Python, PowerShell, Bash.
Network offensive tools: Responder, BloodHound, CrackMapExec, Mimikatz.
Exposure to cloud exploitation (AWS/Azure) is a plus.
Qualifications
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or equivalent experience.
2-4 years in red teaming, offensive security, exploit research, or malware analysis.
Preferred certifications: OSCP, OSCE, OSEP, OSEE, CRTO, CRTE, GXPN.
Preferred Skills
Experience in Android hacking, mobile exploit development, or mobile malware analysis.
Understanding of implant development, C2 frameworks, or persistence techniques.
Familiarity with threat hunting and SOC operations for purple teaming.
Experience supporting defense, intelligence, or law enforcement missions.
Why Join Us
Work with a top-tier cyber offensive and intelligence team.
Contribute to high-impact national security and cyber defense projects.
Participate in advanced offensive R&D, zero-day research, and red-team missions.
High-growth environment with freedom to innovate and conduct hands-on experimentation.
Job Type: Full-time
Pay: ₹480,000.00 - ₹750,000.00 per year
Work Location: In person
Beware of fraud agents! do not pay money to get a job
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.