Engineering Red Linux Security
About ST Engineering Info-Security Pte Ltd (STE) At STE, we are at the forefront of cybersecurity innovation, designing and developing cutting-edge solutions to protect our clients in an ever-evolving threat landscape. We also excel at seamlessly integrating our unique capabilities with best-in-class products to deliver comprehensive and robust security architectures. We are a passionate team dedicated to building a safer digital world. We are looking for a highly motivated and skilled Red Team Offensive Member to join our dedicated cybersecurity team. In this role, you will be a key contributor to our adversarial simulation efforts, actively participating in Red Team operations to test and improve our organization's defensive capabilities. This position focuses on executing realistic attack scenarios, utilizing offensive tools, and providing valuable insights to strengthen our overall security posture. Important note: This is a hands-on offensive role, distinct from traditional Vulnerability Assessment and Penetration Testing (VAPT). Responsibilities: • Develop, enhance, and maintain custom tools and frameworks used in red team operations. • Simulate real-world attacks such as TTPs to test and improve organizational defences. • Research and implement novel attack techniques, evasion methods, and post-exploitation strategies. • Collaborate with internal teams to integrate red team capabilities into broader security initiatives. • Operate with stealth and precision to minimize detection and effectively test our Blue Team's incident detection and response capabilities. • Conduct various offensive activities, including network exploitation, web application attacks, social engineering, and physical security assessments, including training. • Stay up to date with emerging threats, vulnerabilities, and adversary tactics. • Document methodologies, tools, and findings clearly and effectively. Continuous Learning & Improvement: • Continuously enhance personal offensive security skills and knowledge by staying current with the latest attack methodologies, tools, and threat intelligence. • Participate in internal knowledge-sharing sessions and contribute to the team's collective expertise.
• Minimum of 4 years of hands-on experience in Red Teaming, Offensive Security. • Demonstrated experience in developing custom malware, payloads, or offensive tools. • Strong understanding of malware behaviour, execution chains, and evading detection (AV/EDR/EPP). • Deep knowledge of Windows and/or Linux internals, memory manipulation, and exploitation techniques. • Strong understanding of attack lifecycle, TTPs (Tactics, Techniques, and Procedures), and MITRE ATT&CK framework. • Proficiency in at least one low-level or systems programming language (e.g., C/C++, Rust, Go, Assembly). • Deep knowledge of Windows and/or Linux internals and exploitation techniques. • Experience with common penetration testing and red teaming tools (e.g., Metasploit, Cobalt Strike, Sliver, Mythic, etc.). It will be excellent when you have developed your own tools. • Ability to work independently, adapt quickly to new challenges, and think creatively under constraints. • Excellent communication skills and the ability to explain technical concepts clearly. • Open-minded, flexible, and comfortable working in fast-paced, evolving environments.
ST Engineering is one of Asia's largest defense and engineering groups. It has also diversified over the years, and now supplies both military customers and commercial ones in over 100 countries, which cover its four core businesses -- aerospace, land systems, electronics and marine. - Meal allowance & transportation allowance - Laptop - 100% salary from probation - Training from probation - Free learning of all courses on LinkedIn e-learning - Private insurance for employees from probation - SHUI is paid on total Gross Base salary - Annual performance review - Annual salary review - Lots of periodic company gatherings and events.
Bonus Points If You Have • Malware Development especially Fully Undetectable (FUD). • Experience with malware development, reverse engineering, or exploit development. • Contributions to open-source offensive tools or frameworks. • Strong understanding of x86/x64 assembly and low-level debugging. • Active security clearances or certifications (e.g., OSED, OSCE, CRTO, GPEN). Certification is optional. An impressive portfolio is more important.
Delivery Manager
Online interview (in English), additional interviews if needed