Adversary Exploitation Lead
full-time • Remote • $40 - $80
Role Overview
The Adversary Exploitation Lead evaluates threat-actor behaviors, exploitation workflows, attack chains, and system vulnerabilities. This role focuses on analyzing adversary tactics, identifying weaknesses, and producing structured assessments of cyber threat activity.
What You’ll Do
- Analyze exploitation chains, privilege-escalation paths, and attack surfaces
- Evaluate threat-actor tactics, techniques, and procedures (TTPs)
- Identify systemic weaknesses that enable exploitation
- Summarize adversary behaviors and operational patterns
- Validate detection logic and defensive assumptions
- Support recurring reviews of threat-intelligence datasets and simulation outputs
What You Bring
Must-Have:
- Experience in cybersecurity, offensive security, or threat intelligence
- Deep understanding of exploit development and adversary tradecraft
- Strong analytical writing and structured documentation ability
Nice-to-Have:
- Familiarity with MITRE ATT&CK, red-team methodologies, or malware analysis
