LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

安全攻防工程师

at Bybit

Back to all Cybersecurity jobs
Bybit logo
Industry not specified

安全攻防工程师

at Bybit

Mid LevelNo visa sponsorshipCybersecurity

Posted 10 hours ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Not specified

Responsible for leading and performing red-blue team exercises, simulated attacks, and adversarial planning to identify vulnerabilities across networks, applications, and systems. Develop tools for red team activities and validate emerging attack techniques tailored to the organization's environment. Conduct penetration testing on critical business systems, internal networks, and cloud environments, and deliver remediation recommendations. Collaborate with the blue team and other departments to improve security mechanisms and drive vulnerability remediation.

Job Responsibilities

Red-Blue Team Exercises

Develop and execute penetration testing and adversarial plans simulating real-world attack scenarios to identify potential vulnerabilities in the organization's network, applications, and systems.

Lead or participate in red-blue team exercises to assess the detection, response, and recovery capabilities of the defense team.

Attack Surface Analysis

Identify the organization's network exposure and evaluate risks, providing appropriate mitigation recommendations.

Monitor and gather threat intelligence, analyze attack trends, and apply findings to adversarial exercises.

Tools and Technology Development

Develop and optimize tools and scripts for red team activities, including vulnerability discovery, privilege escalation, and lateral movement.

Research and validate emerging attack techniques, simulating realistic threats tailored to the organization's environment.

Security Assessment and Reporting

Conduct penetration tests on critical business systems, internal networks, and cloud environments, delivering detailed assessment reports and remediation recommendations.

Assist in improving the organization’s security mechanisms and promote the optimization of security systems.

Cross-Department Collaboration

Collaborate with the defense team (blue team) on post-attack reviews and vulnerability remediation.

Provide security support to other departments, including incident response drills and development security consultation.


Job Requirements

Fundamental Skills

Solid understanding of network security fundamentals, including TCP/IP protocols, network architecture, and the principles and configuration of security devices.

Proficiency in common attack techniques and tools (e.g., Sliver, NPS, Burp Suite).

Familiarity with mainstream operating systems (Windows, Linux, Mac) and the security mechanisms and vulnerability exploitation techniques of common web frameworks.

Technical Proficiency

Thorough knowledge of penetration testing processes and methodologies, including information gathering, vulnerability scanning, internal network penetration, attacks, and persistence.

Expertise in one or more programming/scripting languages (e.g., Python, Go, Bash).

Experience Requirements

At least 5 years of experience in red team/penetration testing, with preference for candidates experienced in large-scale adversarial exercises.

Familiarity with enterprise-level security products (e.g., WAF, EDR, SIEM) and bypass techniques.

Additional Skills

Possession of relevant security certifications (e.g., OSCP, OSCE, CISSP, CISP, CEH) is a plus.

Strong documentation skills with the ability to produce high-quality technical reports.

High sense of responsibility, strong team collaboration, and ability to work under pressure.


Bonus Points

Familiarity with cloud platform security (e.g., AWS, Tencent, Azure) and offensive/defensive techniques.

Hands-on experience with zero-trust architectures or security operations projects.

A keen awareness of new technologies and tools in the security industry, coupled with a proactive attitude towards knowledge sharing.




安全攻防工程师

at Bybit

Back to all Cybersecurity jobs
Bybit logo
Industry not specified

安全攻防工程师

at Bybit

Mid LevelNo visa sponsorshipCybersecurity

Posted 10 hours ago

No clicks

Compensation
Not specified

Currency: Not specified

City
Not specified
Country
Not specified

Responsible for leading and performing red-blue team exercises, simulated attacks, and adversarial planning to identify vulnerabilities across networks, applications, and systems. Develop tools for red team activities and validate emerging attack techniques tailored to the organization's environment. Conduct penetration testing on critical business systems, internal networks, and cloud environments, and deliver remediation recommendations. Collaborate with the blue team and other departments to improve security mechanisms and drive vulnerability remediation.

Job Responsibilities

Red-Blue Team Exercises

Develop and execute penetration testing and adversarial plans simulating real-world attack scenarios to identify potential vulnerabilities in the organization's network, applications, and systems.

Lead or participate in red-blue team exercises to assess the detection, response, and recovery capabilities of the defense team.

Attack Surface Analysis

Identify the organization's network exposure and evaluate risks, providing appropriate mitigation recommendations.

Monitor and gather threat intelligence, analyze attack trends, and apply findings to adversarial exercises.

Tools and Technology Development

Develop and optimize tools and scripts for red team activities, including vulnerability discovery, privilege escalation, and lateral movement.

Research and validate emerging attack techniques, simulating realistic threats tailored to the organization's environment.

Security Assessment and Reporting

Conduct penetration tests on critical business systems, internal networks, and cloud environments, delivering detailed assessment reports and remediation recommendations.

Assist in improving the organization’s security mechanisms and promote the optimization of security systems.

Cross-Department Collaboration

Collaborate with the defense team (blue team) on post-attack reviews and vulnerability remediation.

Provide security support to other departments, including incident response drills and development security consultation.


Job Requirements

Fundamental Skills

Solid understanding of network security fundamentals, including TCP/IP protocols, network architecture, and the principles and configuration of security devices.

Proficiency in common attack techniques and tools (e.g., Sliver, NPS, Burp Suite).

Familiarity with mainstream operating systems (Windows, Linux, Mac) and the security mechanisms and vulnerability exploitation techniques of common web frameworks.

Technical Proficiency

Thorough knowledge of penetration testing processes and methodologies, including information gathering, vulnerability scanning, internal network penetration, attacks, and persistence.

Expertise in one or more programming/scripting languages (e.g., Python, Go, Bash).

Experience Requirements

At least 5 years of experience in red team/penetration testing, with preference for candidates experienced in large-scale adversarial exercises.

Familiarity with enterprise-level security products (e.g., WAF, EDR, SIEM) and bypass techniques.

Additional Skills

Possession of relevant security certifications (e.g., OSCP, OSCE, CISSP, CISP, CEH) is a plus.

Strong documentation skills with the ability to produce high-quality technical reports.

High sense of responsibility, strong team collaboration, and ability to work under pressure.


Bonus Points

Familiarity with cloud platform security (e.g., AWS, Tencent, Azure) and offensive/defensive techniques.

Hands-on experience with zero-trust architectures or security operations projects.

A keen awareness of new technologies and tools in the security industry, coupled with a proactive attitude towards knowledge sharing.




SIMILAR OPPORTUNITIES

No similar jobs available at the moment.