Role Overview
The Adversary Exploitation Lead evaluates threat-actor behaviors, exploitation workflows, attack chains, and system vulnerabilities. This role focuses on analyzing adversary tactics, identifying weaknesses, and producing structured assessments of cyber threat activity.
What You’ll Do
– Analyze exploitation chains, privilege-escalation paths, and attack surfaces
– Evaluate threat-actor tactics, techniques, and procedures (TTPs)
– Identify systemic weaknesses that enable exploitation
– Summarize adversary behaviors and operational patterns
– Validate detection logic and defensive assumptions
– Support recurring reviews of threat-intelligence datasets and simulation outputs
What You Bring
Must-Have:
– Experience in cybersecurity, offensive security, or threat intelligence
– Deep understanding of exploit development and adversary tradecraft
– Strong analytical writing and structured documentation ability
Nice-to-Have:
– Familiarity with MITRE ATT&CK, red-team methodologies, or malware analysis
$40 – $80 an hour
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Apply info ->
To apply for this job, please visit jobs.lever.co

