HOC Attacker - Denver, CO/ Waltham, MA/ Remote
Have you ever been chomping at the bit to throw an amazing 0-day, but you have to wait for the tooling to be stable enough to make it work? Have you ever been rushing to rapidly leverage an n-day disclosure, because you’re certain you’re going to lose the only toehold you have, and you need another point of presence? Do you know what it feels like to be the worst hacker, worst hacker, worst hacker, worst hacker, BEST HACKER EVER, worst hacker, worst hacker, worst hacker? Yeah. Us too.
At Randori, we help defenders continuously assess their real-world security. Our automated attack platform provides a red team experience designed to mirror today’s adversaries, not yesterday’s threats. We partner with security teams to help them understand the art of the possible by delivering an unrivaled attack experience, at scale.
As a Randori Hacker Operations Center (HOC) Attacker, you’ll use our Attack Platform to help customers improve their security programs. You’ll be responsible for inventing clever new ways of ruining defenders’ days, and then you’ll work with our red team, researchers, and developers to drive those innovations throughout our platform and across our customers. The work is frenetic but has a tremendous impact on our customers and the security market as a whole.
We are looking for individuals that are driven, proactive, thorough and forward looking. You have at your fingertips a mastery of several programming languages and red-team technologies. You can debug something from layer 1 to 7 in the OSI Model and you’ve hacked your way through understanding more applications and devices than you can remember. You have the determination to grind through the pain, the patience to wait-out your opponents, and you know with certainty that you can win on a long enough timeline.
Responsibilities of the Role:
What is Required:
Every Randori employee has the responsibility to ensure all tasks performed adhere to Randori’s Information Security requirements. This includes understanding and following security policies, participation in information security training, and helping improve the organization's overall security maturity. Each member of our team must understand their role in protecting company assets and the subsequent handling of confidential & customer data.
Your application was submitted successfully.