{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/c2-frameworks"},"x-facet":{"type":"skill","slug":"c2-frameworks","display":"C2 Frameworks","count":3},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_5d163ac4-a9b"},"title":"Staff Engineer, Offensive Security","description":"<p>As a Staff Engineer, Offensive Security at Twilio, you will act as a Technical Lead and design complex attack chains that demonstrate systemic risk. You will spend as much time writing custom code and researching new bypasses as you do executing tests. Key responsibilities include:</p>\n<ul>\n<li>Full-Stack Penetration Testing: Perform manual and automated testing of web applications, APIs, and mobile apps (iOS/Android).</li>\n<li>Internal/External Network Audits: Conduct network and cloud level assessments with various tooling.</li>\n<li>Vulnerability Validation: Triage and validate reports from automated scanners or bug bounty hunters to eliminate false positives and escalate true positives.</li>\n<li>AI/LLM Probing: Perform initial prompt injection and jailbreak tests on AI prototypes, services, and applications using established checklists (OWASP Top 10 for LLMs).</li>\n<li>Technical Reporting: Draft high-quality reports that detail the &#39;path to compromise&#39; with clear, reproducible steps for developers.</li>\n<li>Tool Maintenance: Manage and update the team&#39;s testing infrastructure (e.g., Burp Suite, and basic C2 listeners).</li>\n<li>Remediation Support: Provide direct technical guidance to engineering teams on how to patch vulnerabilities like XSS, SQLi, and IDOR.</li>\n<li>Adversary Emulation: Design and lead multi-week Red Team operations that mimic specific threat actors (APTs) to test the SIRT detection capabilities.</li>\n<li>Custom Exploit Development: Build custom payloads, droppers, and obfuscated scripts to bypass EDR/AV and maintain stealth.</li>\n<li>AI Red Teaming Architecture: Build automated testing frameworks for AI systems (e.g., using PyRIT, Promptfoo, or Garak) to test for models related to sensitive data leakage.</li>\n<li>Cloud &amp; Infrastructure Attacks: Execute sophisticated attacks against AWS/Azure/K8s, focusing on IAM misconfigurations and container escapes.</li>\n<li>Purple Teaming: Collaborate with SIRT and Detection Engineering to tune SIEM alerts based on the techniques used during an engagement.</li>\n<li>Strategic Bug Bounty Management: Oversee the organization&#39;s bug bounty program, identifying trends in submissions to suggest broad architectural security changes.</li>\n</ul>\n<p>Requirements:</p>\n<ul>\n<li>7-10 years of experience in offensive security, penetration testing, a high-volume bug bounty background, AppSec, or vulnerability exploitation, and a track record of finding high/critical vulnerabilities in complex environments using pentesting commercial or custom tools.</li>\n<li>Expert knowledge and solid understanding of the MITRE ATT&amp;CK matrix and the OWASP Top 10 for web applications and top 10 for LLMs, post-exploitation (lateral movement, persistence, data exfiltration) and Adversarial ML.</li>\n<li>Proficient in OffSec popular tools like Burp Suite professional, Nmap, Metasploit, Wireshark, etc., and AI security tools such as LangChain, TensorFlow for adversarial testing or, as well as use of C2 frameworks (Cobalt Strike, Sliver, Havoc) or similar tools.</li>\n<li>Ability to write functional scripts in Python or Bash to automate repetitive testing tasks and proficiency in coding and scripting like Python, C++, and scripting for creating custom offensive exploits that avoid signature-based detection.</li>\n<li>Possession of advanced industry certifications such as OSCP, OSEP, OSWE, GXPN or similar training in OffSec tracks is highly desirable.</li>\n</ul>\n<p>Note: This role will be remote and based in Ireland, with approximately 15% travel anticipated to help connect in-person with customers and colleagues.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_5d163ac4-a9b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Twilio","sameAs":"https://www.twilio.com/","logo":"https://logos.yubhub.co/twilio.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/twilio/jobs/7622285","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Offensive Security","Penetration Testing","Bug Bounty","AppSec","Vulnerability Exploitation","MITRE ATT&CK Matrix","OWASP Top 10","Post-Exploitation","Adversarial ML","Burp Suite","Nmap","Metasploit","Wireshark","LangChain","TensorFlow","C2 Frameworks","Python","Bash","C++"],"x-skills-preferred":[],"datePosted":"2026-04-25T20:58:11.674Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - Ireland"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Offensive Security, Penetration Testing, Bug Bounty, AppSec, Vulnerability Exploitation, MITRE ATT&CK Matrix, OWASP Top 10, Post-Exploitation, Adversarial ML, Burp Suite, Nmap, Metasploit, Wireshark, LangChain, TensorFlow, C2 Frameworks, Python, Bash, C++"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_1e992e68-7cd"},"title":"Staff Engineer, Offensive Security","description":"<p>As a Staff Engineer, Offensive Security at Twilio, you will act as a Technical Lead and design complex attack chains that demonstrate systemic risk. You will spend as much time writing custom code and researching new bypasses as you do executing tests.</p>\n<p>In this role, you will:</p>\n<p>Perform manual and automated testing of web applications, APIs, and mobile apps (iOS/Android). Conduct network and cloud level assessments with various tooling. Triage and validate reports from automated scanners or bug bounty hunters to eliminate false positives and escalate true positives. Perform initial prompt injection and jailbreak tests on AI prototypes, services, and applications using established checklists (OWASP Top 10 for LLMs). Draft high-quality reports that detail the &quot;path to compromise&quot; with clear, reproducible steps for developers. Manage and update the team&#39;s testing infrastructure (e.g., Burp Suite, and basic C2 listeners). Provide direct technical guidance to engineering teams on how to patch vulnerabilities like XSS, SQLi, and IDOR. Design and lead multi-week Red Team operations that mimic specific threat actors (APTs) to test the SIRT detection capabilities. Build custom payloads, droppers, and obfuscated scripts to bypass EDR/AV and maintain stealth. Build automated testing frameworks for AI systems (e.g., using PyRIT, Promptfoo, or Garak) to test for models related to sensitive data leakage. Execute sophisticated attacks against AWS/Azure/K8s, focusing on IAM misconfigurations and container escapes. Collaborate with SIRT and Detection Engineering to tune SIEM alerts based on the techniques used during an engagement. Oversee the organization&#39;s bug bounty program, identifying trends in submissions to suggest broad architectural security changes.</p>\n<p>Twilio values diverse experiences from all kinds of industries, and we encourage everyone who meets the required qualifications to apply.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_1e992e68-7cd","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Twilio","sameAs":"https://www.twilio.com/","logo":"https://logos.yubhub.co/twilio.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/twilio/jobs/7622285","x-work-arrangement":"remote","x-experience-level":"staff","x-job-type":"full-time","x-salary-range":null,"x-skills-required":["Offensive security","Penetration testing","Bug bounty","AppSec","Vulnerability exploitation","MITRE ATT&CK matrix","OWASP Top 10 for web applications","OWASP Top 10 for LLMs","Post exploitation","Adversarial ML","Burp Suite professional","Nmap","Metasploit","Wireshark","LangChain","TensorFlow","C2 frameworks","Python","Bash","C++"],"x-skills-preferred":["Telecom expertise","Excellent written and verbal communication skills","Ability to influence and build effective working relationships with all levels of the organization","Proficiency in multiple languages applicable to the region"],"datePosted":"2026-04-18T15:49:45.138Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - Ireland"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Offensive security, Penetration testing, Bug bounty, AppSec, Vulnerability exploitation, MITRE ATT&CK matrix, OWASP Top 10 for web applications, OWASP Top 10 for LLMs, Post exploitation, Adversarial ML, Burp Suite professional, Nmap, Metasploit, Wireshark, LangChain, TensorFlow, C2 frameworks, Python, Bash, C++, Telecom expertise, Excellent written and verbal communication skills, Ability to influence and build effective working relationships with all levels of the organization, Proficiency in multiple languages applicable to the region"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_64fb6c63-a4b"},"title":"Senior Product Security Engineer, Red Team","description":"<p>Secure Every Identity, from AI to Human Identity is the key to unlocking the potential of AI. Okta secures AI by building the trusted, neutral infrastructure that enables organisations to safely embrace this new era.</p>\n<p>This work requires a relentless drive to solve complex challenges with real-world stakes. We are looking for builders and owners who operate with speed and urgency and execute with excellence. This is an opportunity to do career-defining work. We&#39;re all in on this mission. If you are too, let&#39;s talk.</p>\n<p>Within the Product Security team, our Red Team delivers robust security assurance for Okta&#39;s products, services, and infrastructure. You will be the team&#39;s dedicated infrastructure and tooling engineer, the first person in this role for a small team of operators. You will work alongside operators but not report through an operator chain; you&#39;ll collaborate as a peer focused on a different discipline.</p>\n<p>We seek a Staff Security Infrastructure Engineer to own the engineering backbone that enables our operations. This is not a traditional operator role but a dedicated infrastructure, tooling, and automation engineering position embedded within the Red Team.</p>\n<p>You will design, build, maintain, and continuously improve the platforms, infrastructure, and custom tooling that our operators depend on to execute engagements. Your work directly enables the team to operate at a higher maturity level: faster infrastructure deployment, more resilient and OPSEC-aware architecture, automated workflows, and reliable custom tooling, freeing operators to focus on the mission.</p>\n<p>Your role will also extend to cultivating stakeholder collaboration and elevating our company’s security posture through strategic engagement and proactive measures. As the team matures, this role can evolve toward platform leadership, custom capability development, or a hybrid operator/engineer path.</p>\n<p><strong>Responsibilities</strong></p>\n<p><strong>Infrastructure Engineering &amp; Automation:</strong></p>\n<ul>\n<li>Own the full lifecycle of red team infrastructure: design, provisioning, configuration, maintenance, and teardown</li>\n<li>Build and maintain Infrastructure-as-Code (IaC) using Terraform (or equivalent) to automate deployment of C2 servers, redirectors, phishing infrastructure, payload-delivery systems, and supporting services.</li>\n<li>Resource and asset lifecycle management through tracking domains, certificates, cloud accounts, recurring expenses, and infrastructure resources; managing acquisition, rotation, and retirement.</li>\n</ul>\n<p><strong>Tooling Development &amp; Maintenance:</strong></p>\n<ul>\n<li>Develop, maintain, and improve custom tools, scripts, and automation to support red team operations (e.g., payload generation pipelines, log aggregation, C2 profile management, infrastructure health checks), providing on-demand infrastructure/tooling support when issues or gaps arise.</li>\n<li>Collaborate closely with operators during engagement planning to understand infrastructure requirements, OPSEC constraints, and operational timelines.</li>\n<li>Building and maintaining a representative test environment for pre-operation validation of tools and tradecraft against a security stack similar to the target.</li>\n<li>Maintaining the team&#39;s source code repository with merge/pull request processes, documentation, and code quality standards.</li>\n<li>Ensuring engagement evidence, infrastructure logs, and operational data are centrally collected and accessible for reporting and after-action reviews.</li>\n<li>Contribute to and maintain metrics that demonstrate infrastructure maturity, operational efficiency, and readiness (e.g., deployment time, rebuild time, infrastructure availability during engagements).</li>\n</ul>\n<p><strong>Security &amp; OPSEC:</strong></p>\n<ul>\n<li>Design infrastructure with OPSEC as a first-class requirement: network segmentation, traffic separation between operations, credential management, and access controls</li>\n<li>Implement and manage secure access to red team infrastructure</li>\n<li>Create and update operational runbooks, infrastructure documentation, and SOPs for the team.</li>\n<li>Maintain clear records of infrastructure ownership and attribution to support deconfliction processes.</li>\n</ul>\n<p><strong>Requirements</strong></p>\n<ul>\n<li>5+ years of professional experience in infrastructure engineering, DevOps, platform engineering, or a similar role with significant automation responsibilities</li>\n<li>Strong familiarity with Terraform (or equivalent IaC tooling) for multi-cloud infrastructure provisioning and management</li>\n<li>Experience operating in cloud-native, SaaS, or identity-focused environments</li>\n<li>Strong proficiency with configuration management tools (Ansible, or equivalent)</li>\n<li>Proficiency in at least one systems programming or scripting language (Python, Go, Bash) with disciplined development practices (version control, code review, testing, documentation)</li>\n<li>Solid understanding of Linux systems administration, networking fundamentals (DNS, HTTP/S, TCP/IP, proxying, TLS), and cloud platforms (AWS, GCP, or Azure)</li>\n<li>Understanding of OPSEC principles as they apply to offensive infrastructure , you know why redirector chains, domain categorization, traffic separation, and certificate management matter.</li>\n</ul>\n<p><strong>Desired Qualifications</strong></p>\n<ul>\n<li>Experience building and maintaining CI/CD pipelines (GitHub Actions, GitLab CI, Jenkins, or similar)</li>\n<li>Familiarity with containerization and orchestration (Docker, Kubernetes) as applicable to tooling and lab environments</li>\n<li>Familiarity with C2 frameworks (Cobalt Strike, Mythic, Sliver, or similar) from an infrastructure and deployment perspective , you don&#39;t need to operate them, but you need to understand what operators need from the infrastructure</li>\n<li>Familiarity with detection evasion concepts as they relate to infrastructure (e.g., traffic shaping, hosting provider reputation, certificate transparency)</li>\n</ul>\n<p><strong>Nice to Have</strong></p>\n<ul>\n<li>Working knowledge of Blue Team operations and related technologies</li>\n<li>Experience with security tool development (implant development, payload engineering, evasion tooling) , this role can grow in that direction</li>\n<li>Familiarity with Red Team maturity models and how infrastructure/tooling capabilities map to organisational maturity</li>\n</ul>\n<p>Note: This is not an operator role. You will not be the person running hands-on-keyboard engagements as your primary function. While you may participate in operations to understand requirements or provide support, your core mission is ensuring the team&#39;s infrastructure, workflows, tooling, and automation are reliable, repeatable, and mature. You are the engineering foundation the operators build on.</p>\n<p>#LI-TM #LI-Hybrid (P22302_3403905)</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_64fb6c63-a4b","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Okta","sameAs":"https://www.okta.com/","logo":"https://logos.yubhub.co/okta.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/okta/jobs/7773769","x-work-arrangement":"hybrid","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$114,000-$157,300 USD","x-skills-required":["Terraform","Infrastructure-as-Code","Linux systems administration","Networking fundamentals","Cloud platforms","Configuration management tools","Systems programming or scripting language","OPSEC principles"],"x-skills-preferred":["CI/CD pipelines","Containerization and orchestration","C2 frameworks","Detection evasion concepts"],"datePosted":"2026-04-18T15:44:54.409Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Toronto, Ontario, Canada"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Terraform, Infrastructure-as-Code, Linux systems administration, Networking fundamentals, Cloud platforms, Configuration management tools, Systems programming or scripting language, OPSEC principles, CI/CD pipelines, Containerization and orchestration, C2 frameworks, Detection evasion concepts","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":114000,"maxValue":157300,"unitText":"YEAR"}}}]}