The Adversary Exploitation Lead evaluates threat-actor behaviors, exploitation workflows, attack chains, and system vulnerabilities. This role focuses on analyzing adversary tactics, identifying weaknesses, and producing structured assessments of cyber threat activity.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed