Crossing Hurdles is seeking a Cyber Security Expert specializing in both Red Team and Blue Team activities. The role involves applying cybersecurity expertise to evaluate AI systems, investigate incidents, and provide structured feedback to improve detection and response workflows.
Responsibilities:
- Apply real-world defensive and offensive cybersecurity expertise to evaluate and stress-test AI systems built for threat detection, incident response, and attack simulation
- Investigate and analyze real or simulated incidents such as phishing, ransomware, lateral movement, and privilege escalation
- Review logs and telemetry from SIEM, EDR/XDR, firewall, cloud, and identity systems
- Map adversary behaviors using frameworks such as MITRE ATT&CK and assess detection quality, triage decisions, and response workflows
- Analyze attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration
- Simulate adversarial thinking to identify detection gaps, bypass techniques, and evasion strategies
- Evaluate AI-generated investigations for technical accuracy, operational realism, and logical reasoning
- Provide structured feedback to refine benchmarks for detection, triage, and attack simulation accuracy
Requirements:
- Strong experience of cybersecurity experience in roles such as SOC Analyst (Level II/III), Incident Responder, Detection Engineer, Threat Hunter, Red Team Operator, Penetration Tester, or Security Consultant (Offensive Security)
- Hands-on experience responding to or conducting real-world security incidents
- Strong Blue Team experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, Elastic), EDR/XDR tools (e.g., CrowdStrike, Defender, Carbon Black), log analysis, event correlation, and network traffic analysis (e.g., Wireshark, Zeek, tcpdump)
- Familiarity with MITRE ATT&CK mapping and detection engineering practices
- Red Team experience with penetration testing methodologies, adversary emulation, exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents), privilege escalation, lateral movement, and evasion techniques
- Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus
- Strong written documentation skills explaining investigative and adversarial reasoning
- Ability to think from both attacker and defender perspectives and perform structured, logical analysis