via LinkedIn
$83K - 166K a year
Analyze exploitation chains, evaluate threat-actor TTPs, identify systemic weaknesses, and validate detection logic.
Experience in cybersecurity or threat intelligence, deep understanding of exploit development, and strong documentation skills.
Role Overview The Adversary Exploitation Lead evaluates threat-actor behaviors, exploitation workflows, attack chains, and system vulnerabilities. This role focuses on analyzing adversary tactics, identifying weaknesses, and producing structured assessments of cyber threat activity. What You’ll Do • Analyze exploitation chains, privilege-escalation paths, and attack surfaces • Evaluate threat-actor tactics, techniques, and procedures (TTPs) • Identify systemic weaknesses that enable exploitation • Summarize adversary behaviors and operational patterns • Validate detection logic and defensive assumptions • Support recurring reviews of threat-intelligence datasets and simulation outputs Must-Have What You Bring • Experience in cybersecurity, offensive security, or threat intelligence • Deep understanding of exploit development and adversary tradecraft • Strong analytical writing and structured documentation ability Nice-to-Have • Familiarity with MITRE ATT&CK, red-team methodologies, or malware analysis $40 - $80 an hour
This job posting was last updated on 12/12/2025