Offensive Security Engineer

Engineering Red Linux Security

Icon salary 年収
交渉可能
Icon Location Location
Ho Chi Minh

Benefits

仕事用のノートパソコン/デスクトップ 仕事用のノートパソコン/デスクトップ
旅行/会社の旅行 旅行/会社の旅行
年間給与の見直し 年間給与の見直し
その他の福利厚生 その他の福利厚生
フル社会保険 フル社会保険
フレックスタイム フレックスタイム
在宅勤務 在宅勤務

Job Overview And Responsibility

About ST Engineering Info-Security Pte Ltd (STE) At STE, we are at the forefront of cybersecurity innovation, designing and developing cutting-edge solutions to protect our clients in an ever-evolving threat landscape. We also excel at seamlessly integrating our unique capabilities with best-in-class products to deliver comprehensive and robust security architectures. We are a passionate team dedicated to building a safer digital world. We are looking for a highly motivated and skilled Red Team Offensive Member to join our dedicated cybersecurity team. In this role, you will be a key contributor to our adversarial simulation efforts, actively participating in Red Team operations to test and improve our organization's defensive capabilities. This position focuses on executing realistic attack scenarios, utilizing offensive tools, and providing valuable insights to strengthen our overall security posture. Important note: This is a hands-on offensive role, distinct from traditional Vulnerability Assessment and Penetration Testing (VAPT). Responsibilities: • Develop, enhance, and maintain custom tools and frameworks used in red team operations. • Simulate real-world attacks such as TTPs to test and improve organizational defences. • Research and implement novel attack techniques, evasion methods, and post-exploitation strategies. • Collaborate with internal teams to integrate red team capabilities into broader security initiatives. • Operate with stealth and precision to minimize detection and effectively test our Blue Team's incident detection and response capabilities. • Conduct various offensive activities, including network exploitation, web application attacks, social engineering, and physical security assessments, including training. • Stay up to date with emerging threats, vulnerabilities, and adversary tactics. • Document methodologies, tools, and findings clearly and effectively. Continuous Learning & Improvement: • Continuously enhance personal offensive security skills and knowledge by staying current with the latest attack methodologies, tools, and threat intelligence. • Participate in internal knowledge-sharing sessions and contribute to the team's collective expertise.

Required Skills and Experience

• Minimum of 4 years of hands-on experience in Red Teaming, Offensive Security. • Demonstrated experience in developing custom malware, payloads, or offensive tools. • Strong understanding of malware behaviour, execution chains, and evading detection (AV/EDR/EPP). • Deep knowledge of Windows and/or Linux internals, memory manipulation, and exploitation techniques. • Strong understanding of attack lifecycle, TTPs (Tactics, Techniques, and Procedures), and MITRE ATT&CK framework. • Proficiency in at least one low-level or systems programming language (e.g., C/C++, Rust, Go, Assembly). • Deep knowledge of Windows and/or Linux internals and exploitation techniques. • Experience with common penetration testing and red teaming tools (e.g., Metasploit, Cobalt Strike, Sliver, Mythic, etc.). It will be excellent when you have developed your own tools. • Ability to work independently, adapt quickly to new challenges, and think creatively under constraints. • Excellent communication skills and the ability to explain technical concepts clearly. • Open-minded, flexible, and comfortable working in fast-paced, evolving environments.

Why Candidate should apply this position

ST Engineering is one of Asia's largest defense and engineering groups. It has also diversified over the years, and now supplies both military customers and commercial ones in over 100 countries, which cover its four core businesses -- aerospace, land systems, electronics and marine. - Meal allowance & transportation allowance - Laptop - 100% salary from probation - Training from probation - Free learning of all courses on LinkedIn e-learning - Private insurance for employees from probation - SHUI is paid on total Gross Base salary - Annual performance review - Annual salary review - Lots of periodic company gatherings and events.

Preferred skills and experiences

Bonus Points If You Have • Malware Development especially Fully Undetectable (FUD). • Experience with malware development, reverse engineering, or exploit development. • Contributions to open-source offensive tools or frameworks. • Strong understanding of x86/x64 assembly and low-level debugging. • Active security clearances or certifications (e.g., OSED, OSCE, CRTO, GPEN). Certification is optional. An impressive portfolio is more important.

Report to

Delivery Manager

Interview process

Online interview (in English), additional interviews if needed

Leena Vu

Headhunter | Recruiter
Verified
employee 813 件の履歴書
cup 215 件の面接
health 36 件のオファー

Apply for this job

Successfully!

Thank you, you have sent the information successfully.

← View more Leena Vu's jobs
upload Click or drag file to this area to upload PDF only (3MB), You can update only 1 CV

Leena Vu

Headhunter | Recruiter
Verified
Icon employee 813 件の履歴書
Icon cup 215 件の面接
Icon health 36 件のオファー

ご成約済みの案件 (36)
  • Check Fullstack Software Engineer への配置
  • Check [HCM] Business Development Manager への配置
  • Check OutSystems Developer への配置
  • Check Senior Software Developer (remote) への配置
  • Check Software Engineer (JavaScript) への配置
  • Check Software Technical Architect への配置
  • Check Senior SRE/ DevOps への配置
  • Check Senior Front-end Engineer (Full-time remote) への配置
  • Check Procure-to-Pay (PTP) Team Lead への配置
  • Check Finance Executive (Financial Reporting) への配置
  • Check Finance Executive (Financial Reporting) への配置
  • Check Senior Software Engineering への配置
  • Check Finance Executive (Consolidation) - role 2 への配置
  • Check Senior Software Engineer (Full-time Remote) への配置
  • Check Frontend Engineer (Full-time remote) への配置
  • Check Senior Back-End Engineer (Full-time remote) への配置
  • Check #Web3 Developer への配置
  • Check Senior Fullstack Engineer (update reward) への配置
  • Check Senior Ruby on Rails Developer への配置
  • Check Frontend Engineer (Full-time Remote) への配置
  • Check Senior Software Engineer (Full-time Remote) への配置
  • Check Senior Software Engineer (Full-time Remote) への配置
  • Check #Senior Blockchain Developer (Solidity/Rust) への配置
  • Check [HN] Senior Frontend (Full-time Remote) への配置
  • Check Senior Software Engineer (Full-time Remote) への配置
  • Check Senior Software Engineer (Full-time Remote) への配置
  • Check [HN] Senior PHP Laravel Backend (Full-time Remote) への配置
  • Check [HCM] Senior Frontend (Full-time Remote) への配置
  • Check Junior Software Engineer への配置
  • Check Lead Fullstack Engineer (Full-time Remote) への配置
  • Check [HCM] Senior Backend developer (PHP Laravel) (Full-time Remote) への配置
  • Check Senior Software Engineer (Full-time Remote) への配置
  • Check Middle/ Senior Fullstack Developer (Strong C#, .NET Core) への配置
  • Check Senior Backend Engineer への配置
  • Check DevOps engineer (AWS/Kubernetes/WP) への配置
  • Check Product Owner への配置
View More
View Less
Sign In

I don't have an account