Gormat
We are seeking a Senior
Cybersecurity Product Manager
with strong background in Offensive Cyber Operations to join our growing team! The ideal candidate will possess a deep technical expertise in vulnerability exploitation, advanced persistent threats (APT), and hands‑on experience with offensive cyber tools and techniques, and will be instrumental in supporting mission‑critical cyber operations and advising on the latest tactics, techniques, and procedures (TTPs).
What You'll Be Doing
Conduct sophisticated exploitation activities against complex targets, leveraging zero‑day vulnerabilities, reverse engineering, and custom payload development.
Support and execute offensive cyber operations, including but not limited to penetration testing, red teaming, and advanced cyber threat emulation.
Exploit common vulnerabilities and misconfigurations associated with common operating systems (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security services (PKI, HTTPS, etc.).
Provide guidance on the latest offensive cyber tools, techniques, and procedures, advising senior leadership and operational teams.
Stay abreast of the latest developments in cybersecurity threats and offensive capabilities and contribute to internal research and development efforts.
Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques.
Assist in the analysis of incidents and breaches, particularly those involving sophisticated adversaries, and provide expertise in tracing and mitigating exploits.
Prepare detailed reports and documentation of exploitation activities, including methodologies, tools used, and results obtained.
What's Required
Bachelor's degree in a STEM discipline.
12+ years of relevant technical experience.
2+ years of experience in offensive cyber operations, exploitation, and/or a related field.
In‑depth knowledge of exploitation frameworks, reverse engineering tools, and offensive cyber techniques (e.g., Metasploit, Cobalt Strike, IDA Pro, Ghidra).
Strong verbal and written communication skills, with the ability to clearly articulate complex technical concepts to non‑technical stakeholders.
Ability to work effectively in a team environment, with a strong focus on collaboration and knowledge sharing.
Familiar with SAFe.
Facilitate interactions between all stakeholders and understand team needs.
Ability to interface and constant engagement with stakeholders.
#J-18808-Ljbffr
Cybersecurity Product Manager
with strong background in Offensive Cyber Operations to join our growing team! The ideal candidate will possess a deep technical expertise in vulnerability exploitation, advanced persistent threats (APT), and hands‑on experience with offensive cyber tools and techniques, and will be instrumental in supporting mission‑critical cyber operations and advising on the latest tactics, techniques, and procedures (TTPs).
What You'll Be Doing
Conduct sophisticated exploitation activities against complex targets, leveraging zero‑day vulnerabilities, reverse engineering, and custom payload development.
Support and execute offensive cyber operations, including but not limited to penetration testing, red teaming, and advanced cyber threat emulation.
Exploit common vulnerabilities and misconfigurations associated with common operating systems (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security services (PKI, HTTPS, etc.).
Provide guidance on the latest offensive cyber tools, techniques, and procedures, advising senior leadership and operational teams.
Stay abreast of the latest developments in cybersecurity threats and offensive capabilities and contribute to internal research and development efforts.
Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques.
Assist in the analysis of incidents and breaches, particularly those involving sophisticated adversaries, and provide expertise in tracing and mitigating exploits.
Prepare detailed reports and documentation of exploitation activities, including methodologies, tools used, and results obtained.
What's Required
Bachelor's degree in a STEM discipline.
12+ years of relevant technical experience.
2+ years of experience in offensive cyber operations, exploitation, and/or a related field.
In‑depth knowledge of exploitation frameworks, reverse engineering tools, and offensive cyber techniques (e.g., Metasploit, Cobalt Strike, IDA Pro, Ghidra).
Strong verbal and written communication skills, with the ability to clearly articulate complex technical concepts to non‑technical stakeholders.
Ability to work effectively in a team environment, with a strong focus on collaboration and knowledge sharing.
Familiar with SAFe.
Facilitate interactions between all stakeholders and understand team needs.
Ability to interface and constant engagement with stakeholders.
#J-18808-Ljbffr