Red Team CTF Guru

We are seeking an exceptional Red Team CTF Guru — a rare offensive security expert with deep mastery in reverse engineering, exploitation, and adversarial thinking. This role is not remote. It is a hands-on, full-time, onsite position for someone who wants to shape elite Red Team training, build advanced CTF challenges, and mentor the next generation of top-tier offensive security professionals. If binaries, debuggers, exploitation chains, and attacker mindset are second nature to you — this role was built for you. This is a relocation role to one of our cyber academies!

See All Jobs Openings

What You’ll Do

Key Responsibilities

Offensive Security & Red Teaming

  • Conduct advanced reverse engineering and binary exploitation
  • Develop real-world attack chains that simulate modern threat actors
  • Research and exploit low-level vulnerabilities
  • Break systems creatively and methodically

 

CTF & Advanced Lab Design

  • Design, develop, and maintain advanced CTF challenges (pwn & reversing)
  • Build realistic attack scenarios with intentional vulnerabilities
  • Create progressive challenges from intermediate to elite level
  • Maintain and improve CTF environments and tooling

 

Instruction & Mentorship

  • Deliver hands-on instruction in advanced Red Team techniques
  • Teach attacker mindset, exploitation methodology, and tradecraft
  • Mentor students through complex debugging and exploitation flows
  • Translate deep technical concepts into structured learning outcomes
  • Research & Continuous Innovation
  • Track and research modern exploitation techniques and bypasses
  • Work with exploit mitigations (ASLR, DEP, stack canaries, CFG, sandboxing)
  • Develop proof-of-concept exploits and internal tooling
  • Contribute to internal Red Team knowledge bases

The Essentials

[Mandatory Requirements & Credentials]

  • Deep experience in Reverse Engineering (x86/x64, ARM)
  • Advanced exploitation experience:
    • Stack & heap exploitation
    • Buffer overflows, use-after-free, race conditions
    • ROP/JOP chains
  • Strong understanding of OS internals (Linux & Windows)
  • Proficiency with tools such as:
    • IDA / Ghidra / Binary Ninja
    • GDB / WinDbg / pwndbg
    • Radare2
  • Excellent low-level debugging skills

Programming & Scripting

  • Python (automation, exploit development)
  • Bash / PowerShell
  • Assembly (reading and writing)

CTF & Community Experience (Highly Preferred)

  • Proven experience participating in or creating CTFs
  • Strong background in pwn / reversing challenges
  • Public writeups, tools, talks, or repositories are a strong advantage
  • Experience training or mentoring others in offensive security

Who You Are

  • You think offensively by default
  • You are deeply curious about how systems fail
  • You enjoy teaching and mentoring advanced learners
  • You are ethical, disciplined, and technically relentless
  • You thrive in immersive, onsite environments

Relocation Details

  • This is a full-time, onsite position
  • Relocation is mandatory
  • Support with relocation and onboarding will be provided (details shared during process)

Nice-to-Have (Bonus)

  • Experience bypassing modern exploit mitigations
  • Red Team infrastructure or C2 knowledge
  • Certifications such as OSCP / OSEP / CRTO / GXPN (nice, not required)
  • Conference speaking or advanced teaching experience

Full Time

On Site

Mid Level

Relocation Package Available

YOU’RE APPLYING FOR:

Red Team CTF Guru



    See All Jobs Openings