We are looking for a Senior Network Attack Specialist to join our Critical Infrastructure Vulnerability Research Team in Singapore.
This role is focused on advanced offensive research and the development of production-grade network attack capabilities targeting critical infrastructure environments. You will play a key role in identifying, researching, and weaponizing vulnerabilities across complex networked systems, while contributing to cutting-edge offensive tooling and adversary simulation capabilities, with a strong focus on improving defensive readiness and resilience.
Responsibilities
- Research and exploit network-level vulnerabilities across critical infrastructure environments, including lateral movement techniques and internal network propagation
- Develop advanced offensive capabilities targeting network protocols, services, and distributed systems, with emphasis on evasion and stealth techniques
- Conduct deep protocol analysis, reverse engineering, and vulnerability discovery
- Design and implement production-ready attack components for adversary simulation and red team activities
- Develop scripts and tooling to support offensive research and automation (Python / low-level languages)
- Research and implement evasion and bypass techniques against modern security controls, including EDR/NDR and network-based defenses
- Collaborate with internal research teams to translate offensive concepts into scalable capabilities that enhance detection and defensive strategies
- Research emerging attack techniques, vulnerabilities, and threat actor methodologies, and apply insights in practice
- Conduct and support social engineering activities as part of broader adversary simulation scenarios
Must Have
- 5+ years of hands-on, tactical experience in offensive security, network exploitation, or vulnerability research – MUST
- Strong experience with network protocols (TCP/IP, DNS, HTTP/S, SMB, etc.) and their security implications
- Experience in vulnerability research, exploit development, or network attack and adversary simulation techniques
- Strong programming/scripting skills (Python required; C/C++ or similar – advantage)
- Experience with packet analysis, fuzzing, and reverse engineering of network services
- Deep understanding of attacker techniques, lateral movement, persistence, and network-based attack surfaces
- Experience with social engineering techniques as part of red team operations
- Strong analytical and problem-solving skills
- Ability to work independently in research-driven environments
- Excellent English communication skills (written and verbal)
Nice to Have
- Background in military cyber units or equivalent experience
- Experience with critical infrastructure environments (ICS/SCADA, OT networks, or similar)
- Familiarity with MITRE ATT&CK and adversary simulation techniques
- Experience with EDR/NDR evasion and covert communication techniques
- Experience with red teaming or advanced adversary emulation
- Prior development of offensive tools, exploit frameworks, or internal R&D platforms
- Understanding of modern threat actor TTPs and real-world attack scenarios