Alignerr
Join to apply for the
Adversary Exploitation Lead
role at
Alignerr .
Location: San Francisco, CA.
Compensation: $40 - $80 an hour.
Role Overview The
Adversary Exploitation Lead
evaluates threat-actor behaviors, exploitation workflows, attack chains, and system vulnerabilities. This role focuses on analyzing adversary tactics, identifying weaknesses, and producing structured assessments of cyber threat activity.
What You’ll Do
Analyze exploitation chains, privilege‑escalation paths, and attack surfaces
Evaluate threat‑actor tactics, techniques, and procedures (TTPs)
Identify systemic weaknesses that enable exploitation
Summarize adversary behaviors and operational patterns
Validate detection logic and defensive assumptions
Support recurring reviews of threat‑intelligence datasets and simulation outputs
What You Bring (Must‑Have)
Experience in cybersecurity, offensive security, or threat intelligence
Deep understanding of exploit development and adversary tradecraft
Strong analytical writing and structured documentation ability
Nice‑to‑Have
Familiarity with MITRE ATT&CK, red‑team methodologies, or malware analysis
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
#J-18808-Ljbffr
Adversary Exploitation Lead
role at
Alignerr .
Location: San Francisco, CA.
Compensation: $40 - $80 an hour.
Role Overview The
Adversary Exploitation Lead
evaluates threat-actor behaviors, exploitation workflows, attack chains, and system vulnerabilities. This role focuses on analyzing adversary tactics, identifying weaknesses, and producing structured assessments of cyber threat activity.
What You’ll Do
Analyze exploitation chains, privilege‑escalation paths, and attack surfaces
Evaluate threat‑actor tactics, techniques, and procedures (TTPs)
Identify systemic weaknesses that enable exploitation
Summarize adversary behaviors and operational patterns
Validate detection logic and defensive assumptions
Support recurring reviews of threat‑intelligence datasets and simulation outputs
What You Bring (Must‑Have)
Experience in cybersecurity, offensive security, or threat intelligence
Deep understanding of exploit development and adversary tradecraft
Strong analytical writing and structured documentation ability
Nice‑to‑Have
Familiarity with MITRE ATT&CK, red‑team methodologies, or malware analysis
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
#J-18808-Ljbffr