Red Team Dev (Intern)

0 years

0 Lacs

Posted:2 days ago| Platform: Foundit logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

About the Role

Join us in building an autonomous penetration testing platform that simulates real-world adversaries. You&aposll develop exploit chains, 0-day discovery systems, and evasive payloads that help organizations understand their security posture for cyber insurance and compliance.

What You&aposll Build
  • Exploit Automation

    : Multi-stage attack chains from initial access to data exfiltration
  • 0-Day Discovery

    : Intelligent fuzzing infrastructure and vulnerability research systems
  • Evasion Techniques

    : Polymorphic payloads that bypass modern EDR/AV solutions
  • Cloud Attacks

    : AWS/Azure/GCP exploitation modules and container escapes
  • Custom C2

    : Covert communication channels and post-exploitation frameworks
  • Reporting Engine

    : Auto-generate compliance-ready pentest reports
Technical Skills Required
  • Languages

    : Python (expert), C/C++, Go/Rust, Assembly basics
  • Web Exploitation

    : OWASP Top 10 (SQLi, XSS, SSRF, Deserialization, SSTI)
  • Binary Exploitation

    : Buffer overflows, ROP chains, heap exploitation
  • Tools

    : Metasploit, Burp Suite, Cobalt Strike, IDA/Ghidra
  • Cloud Security

    : AWS/Azure misconfigs, Docker/K8s attacks
  • Evasion

    : AV bypass, sandbox detection, AMSI/ETW patching
Must-Have Credentials
  • HackTheBox

    : Minimum Pro Hacker rank (50+ owns) - include profile link
  • CTF Experience

    : Active participation (picoCTF, DEF CON quals, GoogleCTF)
  • GitHub Portfolio

    : Security tools, exploit development, CTF writeups
  • Proven Skills

    : CVEs, bug bounties, or published exploits are a huge plus
Preferred Qualifications
  • TryHackMe Top 5% or PortSwigger Academy completion
  • OSCP/OSWE in progress or completed
  • pwnable.kr, ROP Emporium, or Nightmare challenges
  • Personal security research blog or YouTube channel
  • Contributed to open-source security tools
Interview Process
  1. Portfolio Review

    : GitHub + HackTheBox profile assessment
  2. Take-Home Challenge

    : Design an attack chain for given scenario assignment
Red Flags We Avoid
  • Only used automated scanners
  • Can&apost code beyond basic scripts
  • No hands-on exploitation experience
  • Ethical flexibility
Green Flags We Love
  • Built your own tools
  • Linux nut
  • Discovered real vulnerabilities
  • Active security community contributor
Why This Role

This isn&apost a typical security internship running Nessus scans. You&aposll build the platform that makes traditional pentesting obsolete. Your code will simulate real attackers, helping protect thousands of organizations.

We need someone who sees a login page and thinks "SQLi, NoSQLi, LDAP injection, or mass assignment" Someone who gets excited about bypassing protections, not just finding vulns.

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You