dismantl :donor:<p>I am in the job market for a remote red team or offensive security engineer role. I am seasoned full-stack software developer, a OSCP-certified pentester (currently working on CRTO), and system administrator with plenty of cloud experience.</p><p>Before my current role leading the IT & Cybersecurity team at NNAF, I did security research (including developing an improved reflective DLL injection technique [0] that helped inspire the widely used sRDI project [1][2] and has been cited by academics and other security researchers [3][4][5]) and performed pentesting and appsec for a variety of clients from global hedge funds to healthcare to aerospace engineering. Prior to that I did low-level embedded firmware development and experimental research for a wireless mesh networking platform.</p><p>For the last year I have been building an advanced, fully-featured red teaming/adversary simulation platform (which I am happy to demo for potential employers), including a web-based multi-user team server, scriptable API, a cross-platform flagship agent with novel evasion techniques, a variety of cross-platform payloads and stagers, relaying and pivoting, and an easily-extensible set of C2 protocols, both synchronized and asynchronous.</p><p>I am an excellent verbal and written communicator, comfortable translating highly technical topics for a variety of audiences from executives to engineers, and have consistently produced high quality reports for clients. I have experience programming in almost a dozen languages and am quick to learn new technologies.</p><p>Boosts appreciated!</p><p>[0] <a href="https://disman.tl/2015/01/30/an-improved-reflective-dll-injection-technique.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">disman.tl/2015/01/30/an-improv</span><span class="invisible">ed-reflective-dll-injection-technique.html</span></a><br>[1] <a href="https://www.netspi.com/blog/technical/adversary-simulation/srdi-shellcode-reflective-dll-injection/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">netspi.com/blog/technical/adve</span><span class="invisible">rsary-simulation/srdi-shellcode-reflective-dll-injection/</span></a><br>[2] <a href="https://github.com/monoxgas/sRDI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/monoxgas/sRDI</span><span class="invisible"></span></a><br>[3] <a href="https://www.oic-cert.org/en/journal/pdf/1/1/116.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">oic-cert.org/en/journal/pdf/1/</span><span class="invisible">1/116.pdf</span></a><br>[4] <a href="https://euskalhack.org/securitycongress/PDF/Understanding_a_payload's_life.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">euskalhack.org/securitycongres</span><span class="invisible">s/PDF/Understanding_a_payload's_life.pdf</span></a><br>[5] <a href="https://posts.specterops.io/merlin-v0-7-0-release-roll-up-717739cde77a" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">posts.specterops.io/merlin-v0-</span><span class="invisible">7-0-release-roll-up-717739cde77a</span></a></p><p><a href="https://infosec.exchange/tags/infosecjobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecjobs</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/fedihire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedihire</span></a> <a href="https://infosec.exchange/tags/FediHired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediHired</span></a> <a href="https://infosec.exchange/tags/jobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobs</span></a> <a href="https://infosec.exchange/tags/jobhunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobhunting</span></a> <a href="https://infosec.exchange/tags/JobSearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JobSearch</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/malwaredev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwaredev</span></a> <a href="https://infosec.exchange/tags/maldev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maldev</span></a> <a href="https://infosec.exchange/tags/hireme" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hireme</span></a></p>