Enable job alerts via email!

Adversary Research Engineer

AttackIQ

United States

Remote

USD 80,000 - 100,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Join a forward-thinking company as an Adversary Research Engineer, where you'll craft innovative adversary emulations that enhance cybersecurity measures. In this dynamic role, you will leverage your expertise in Python and cybersecurity to analyze adversary tactics, techniques, and procedures (TTPs), translating them into effective simulations used by clients to evaluate their security controls. Collaborating with a global team, your insights will help shape the future of threat response and defense strategies. If you're passionate about cybersecurity and eager to make a tangible impact, this is the perfect opportunity for you.

Qualifications

  • 4+ years in cybersecurity roles like SOC analyst or penetration tester.
  • Strong Python skills and ability to analyze adversary TTPs.

Responsibilities

  • Translate adversary TTPs into emulations for security evaluation.
  • Analyze adversary behavior and implement in Python.

Skills

Python programming
Cybersecurity analysis
Adversary behavior modeling
Pattern recognition
Emotional intelligence

Education

Bachelor's degree

Tools

Kali Linux
Metasploit
Git

Job description

As an Adversary Research Engineer, you will be responsible for producing new adversary emulations that are used to evaluate the performance of information security controls via our Breach and Attack Simulation platform. You’re aware of what the adversaries are doing today, and you’d like to create advantages for our customers and partners.


Essential Duties and Responsibilities
  1. Translate analysis of adversary TTPs into the AttackIQ platform content, which is then used to evaluate the performance of security control technologies by our customers and partners.
  2. Ability to analyze and deconstruct an adversary's behavior, effectively translating it into Python code for development and implementation.
  3. Ability to spot patterns and trends, and to create emulations in response to emerging threats including nation state level and ecrime campaigns.
  4. Work in a globally distributed team of engineers and researchers.

Professional Competencies
  1. Demonstrated understanding of most commonly-deployed information security technologies to support network and endpoint defense — think Palo Alto, Proofpoint, CrowdStrike, Microsoft Defender and beyond.
  2. Hands-on skill with common hacking tools, penetration testing and vulnerability scanning tools like Kali, Metasploit or similar.
  3. Knowledge of current adversary TTPs and how to model behaviors in the context of MITRE ATT&CK.
  4. Smart, driven, and able to think-on-your-feet in a fast-paced environment.
  5. Strong team player with strong emotional intelligence, able to think outside the box and turn ideas into results.
  6. Have proficient working knowledge of Python data structures, algorithms, abstract classes, advanced concepts, and the ability to write clean, well-documented, and efficient Python code.
  7. First-hand experience of creating custom tooling, applying enhancements and bug fixes.
  8. Have proficient working knowledge of git.
  9. Comfortable with getting into the internals of at least one operating system.

Required Experience and Skills
  1. Bachelor’s degree.
  2. At least 4 years’ experience in either an offensive or defensive cybersecurity capacity.
  3. You’ve worked as one or more of the following roles: SOC analyst, IR analyst, red teamer, penetration tester, threat researcher, threat hunter, detection engineer, malware analyst, security engineer or similar.
  4. Fluent in English.
  5. Exceptional written, oral, presentation and interpersonal skills.
  6. Seasoned Python developer.
  7. AI/LLM experience a huge plus.
  8. Linux and/or macOS experience a huge plus.

Note to all recruitment agencies:
AttackIQ does not accept agency resumes without a signed agreement. Please do not forward resumes to our jobs alias, our employees, or any other company location. AttackIQ is not responsible for any fees related to unsolicited resumes and will not pay fees to any third-party agency or company that does not have a signed agreement with us.

At AttackIQ we value diversity and are proud to be an equal opportunity employer.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Reverse Engineer, Threat Research Engineering (Remote)

CrowdStrike

Remote

USD 80,000 - 140,000

30+ days ago