Offensive Security Engineer

Engineering Red Linux Security

Icon salary 年収
交渉可能
Icon Location Location
Ho Chi Minh

Benefits

仕事用のノートパソコン/デスクトップ 仕事用のノートパソコン/デスクトップ
旅行/会社の旅行 旅行/会社の旅行
年間給与の見直し 年間給与の見直し
その他の福利厚生 その他の福利厚生
フル社会保険 フル社会保険
フレックスタイム フレックスタイム
在宅勤務 在宅勤務

Job Overview And Responsibility

About ST Engineering Info-Security Pte Ltd (STE) At STE, we are at the forefront of cybersecurity innovation, designing and developing cutting-edge solutions to protect our clients in an ever-evolving threat landscape. We also excel at seamlessly integrating our unique capabilities with best-in-class products to deliver comprehensive and robust security architectures. We are a passionate team dedicated to building a safer digital world. We are looking for a highly motivated and skilled Red Team Offensive Member to join our dedicated cybersecurity team. In this role, you will be a key contributor to our adversarial simulation efforts, actively participating in Red Team operations to test and improve our organization's defensive capabilities. This position focuses on executing realistic attack scenarios, utilizing offensive tools, and providing valuable insights to strengthen our overall security posture. Important note: This is a hands-on offensive role, distinct from traditional Vulnerability Assessment and Penetration Testing (VAPT). Responsibilities: • Develop, enhance, and maintain custom tools and frameworks used in red team operations. • Simulate real-world attacks such as TTPs to test and improve organizational defences. • Research and implement novel attack techniques, evasion methods, and post-exploitation strategies. • Collaborate with internal teams to integrate red team capabilities into broader security initiatives. • Operate with stealth and precision to minimize detection and effectively test our Blue Team's incident detection and response capabilities. • Conduct various offensive activities, including network exploitation, web application attacks, social engineering, and physical security assessments, including training. • Stay up to date with emerging threats, vulnerabilities, and adversary tactics. • Document methodologies, tools, and findings clearly and effectively. Continuous Learning & Improvement: • Continuously enhance personal offensive security skills and knowledge by staying current with the latest attack methodologies, tools, and threat intelligence. • Participate in internal knowledge-sharing sessions and contribute to the team's collective expertise.

Required Skills and Experience

• Minimum of 4 years of hands-on experience in Red Teaming, Offensive Security. • Demonstrated experience in developing custom malware, payloads, or offensive tools. • Strong understanding of malware behaviour, execution chains, and evading detection (AV/EDR/EPP). • Deep knowledge of Windows and/or Linux internals, memory manipulation, and exploitation techniques. • Strong understanding of attack lifecycle, TTPs (Tactics, Techniques, and Procedures), and MITRE ATT&CK framework. • Proficiency in at least one low-level or systems programming language (e.g., C/C++, Rust, Go, Assembly). • Deep knowledge of Windows and/or Linux internals and exploitation techniques. • Experience with common penetration testing and red teaming tools (e.g., Metasploit, Cobalt Strike, Sliver, Mythic, etc.). It will be excellent when you have developed your own tools. • Ability to work independently, adapt quickly to new challenges, and think creatively under constraints. • Excellent communication skills and the ability to explain technical concepts clearly. • Open-minded, flexible, and comfortable working in fast-paced, evolving environments.

Why Candidate should apply this position

ST Engineering is one of Asia's largest defense and engineering groups. It has also diversified over the years, and now supplies both military customers and commercial ones in over 100 countries, which cover its four core businesses -- aerospace, land systems, electronics and marine. - Meal allowance & transportation allowance - Laptop - 100% salary from probation - Training from probation - Free learning of all courses on LinkedIn e-learning - Private insurance for employees from probation - SHUI is paid on total Gross Base salary - Annual performance review - Annual salary review - Lots of periodic company gatherings and events.

Preferred skills and experiences

Bonus Points If You Have • Malware Development especially Fully Undetectable (FUD). • Experience with malware development, reverse engineering, or exploit development. • Contributions to open-source offensive tools or frameworks. • Strong understanding of x86/x64 assembly and low-level debugging. • Active security clearances or certifications (e.g., OSED, OSCE, CRTO, GPEN). Certification is optional. An impressive portfolio is more important.

Report to

Delivery Manager

Interview process

Online interview (in English), additional interviews if needed

Ngân Nguyễn Hoàng Hà

Headhunter | Recruiter
Verified
employee 665 件の履歴書
cup 73 件の面接
health 6 件のオファー

Apply for this job

Successfully!

Thank you, you have sent the information successfully.

← View more Ngân Nguyễn Hoàng Hà's jobs
upload Click or drag file to this area to upload PDF only (3MB), You can update only 1 CV

Ngân Nguyễn Hoàng Hà

Headhunter | Recruiter
Verified
Icon employee 665 件の履歴書
Icon cup 73 件の面接
Icon health 6 件のオファー

ご成約済みの案件 (6)
  • Check Senior IT Consultant への配置
  • Check Senior Software Developer (remote) への配置
  • Check Senior Back-end Developer への配置
  • Check Finance Executive (Financial Reporting) への配置
  • Check AP Invoice Processing への配置
  • Check Senior Nodejs Engineer への配置
View More
View Less
Sign In

I don't have an account