Search by job, company or skills

DeepDefend

Red Team Dev (Intern)

Fresher

This job is no longer accepting applications

new job description bg glownew job description bg glownew job description bg svg
  • Posted 8 months ago

Job Description

About the Role

Join us in building an autonomous penetration testing platform that simulates real-world adversaries. You&aposll develop exploit chains, 0-day discovery systems, and evasive payloads that help organizations understand their security posture for cyber insurance and compliance.

What You&aposll Build
  • Exploit Automation: Multi-stage attack chains from initial access to data exfiltration
  • 0-Day Discovery: Intelligent fuzzing infrastructure and vulnerability research systems
  • Evasion Techniques: Polymorphic payloads that bypass modern EDR/AV solutions
  • Cloud Attacks: AWS/Azure/GCP exploitation modules and container escapes
  • Custom C2: Covert communication channels and post-exploitation frameworks
  • Reporting Engine: Auto-generate compliance-ready pentest reports
Technical Skills Required
  • Languages: Python (expert), C/C++, Go/Rust, Assembly basics
  • Web Exploitation: OWASP Top 10 (SQLi, XSS, SSRF, Deserialization, SSTI)
  • Binary Exploitation: Buffer overflows, ROP chains, heap exploitation
  • Tools: Metasploit, Burp Suite, Cobalt Strike, IDA/Ghidra
  • Cloud Security: AWS/Azure misconfigs, Docker/K8s attacks
  • Evasion: AV bypass, sandbox detection, AMSI/ETW patching
Must-Have Credentials
  • HackTheBox: Minimum Pro Hacker rank (50+ owns) - include profile link
  • CTF Experience: Active participation (picoCTF, DEF CON quals, GoogleCTF)
  • GitHub Portfolio: Security tools, exploit development, CTF writeups
  • Proven Skills: CVEs, bug bounties, or published exploits are a huge plus
Preferred Qualifications
  • TryHackMe Top 5% or PortSwigger Academy completion
  • OSCP/OSWE in progress or completed
  • pwnable.kr, ROP Emporium, or Nightmare challenges
  • Personal security research blog or YouTube channel
  • Contributed to open-source security tools
Interview Process
  1. Portfolio Review: GitHub + HackTheBox profile assessment
  2. Take-Home Challenge: Design an attack chain for given scenario assignment
Red Flags We Avoid
  • Only used automated scanners
  • Can&apost code beyond basic scripts
  • No hands-on exploitation experience
  • Ethical flexibility
Green Flags We Love
  • Built your own tools
  • Linux nut
  • Discovered real vulnerabilities
  • Active security community contributor
Why This Role

This isn&apost a typical security internship running Nessus scans. You&aposll build the platform that makes traditional pentesting obsolete. Your code will simulate real attackers, helping protect thousands of organizations.

We need someone who sees a login page and thinks 'SQLi, NoSQLi, LDAP injection, or mass assignment' Someone who gets excited about bypassing protections, not just finding vulns.

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 125727125

Similar Jobs

PYTHON INTERNSHIP AT AHMEDABAD

**********Company Name Confidential
Early Applicant