Labelbox
Role Overview
The Adversary Exploitation Lead evaluates threat-actor behaviors, exploitation workflows, attack chains, and system vulnerabilities. This role focuses on analyzing adversary tactics, identifying weaknesses, and producing structured assessments of cyber threat activity.
What You’ll Do
Analyze exploitation chains, privilege-escalation paths, and attack surfaces
Evaluate threat-actor tactics, techniques, and procedures (TTPs)
Identify systemic weaknesses that enable exploitation
Summarize adversary behaviors and operational patterns
Validate detection logic and defensive assumptions
Support recurring reviews of threat-intelligence datasets and simulation outputs
What You Bring Must-Have:
Experience in cybersecurity, offensive security, or threat intelligence
Deep understanding of exploit development and adversary tradecraft
Strong analytical writing and structured documentation ability
Nice-to-Have:
Familiarity with MITRE ATT&CK, red-team methodologies, or malware analysis
$40 - $80 an hour
#J-18808-Ljbffr
What You’ll Do
Analyze exploitation chains, privilege-escalation paths, and attack surfaces
Evaluate threat-actor tactics, techniques, and procedures (TTPs)
Identify systemic weaknesses that enable exploitation
Summarize adversary behaviors and operational patterns
Validate detection logic and defensive assumptions
Support recurring reviews of threat-intelligence datasets and simulation outputs
What You Bring Must-Have:
Experience in cybersecurity, offensive security, or threat intelligence
Deep understanding of exploit development and adversary tradecraft
Strong analytical writing and structured documentation ability
Nice-to-Have:
Familiarity with MITRE ATT&CK, red-team methodologies, or malware analysis
$40 - $80 an hour
#J-18808-Ljbffr