Security Researcher
Israel
Cymulate’s Continuous Security Validation enables companies to challenge, assess and optimize their cyber-security posture against the evolving cyberthreat landscape, simply and continuously.
With world-class clients we strive to bring the highest level of service to everything we do. Our team is made up of the very best people for the job and as we grow, we’re always on the lookout for people with the skills, experience, and personality that will let us both shine. With high scores on Gartner, G2 and Glassdoor, our clients and employees have let us know what they love about us.
Cyber Security Researcher
Cymulate is looking for a hands-on Penetration Tester / Red Teamer with strong infrastructure experience to join our team as a Cyber Security Researcher. You’ll be part of the offensive team that researches cutting-edge attacks and translates them into realistic breach simulations across complex environments—Windows domains, cloud infrastructure, Linux systems, and more.
Your work directly powers our Exposure Validation platform, helping organizations understand and defend against modern adversaries.
- Track and analyze the latest attacker TTPs
- Build internal tools, scripts, and POCs to emulate real threat behavior
- Design offensive simulations mapped to the MITRE ATT&CK framework
- Focus areas include:
- Active Directory attacks (on-prem & Azure)
- Cloud infrastructure misconfigurations (AWS, Azure, GCP)
- Linux and network-level attack vectors
- Kubernetes threats and container-based environments
- Write clean, reusable, and documented code in Python, PowerShell, and Bash
- Proven background in infrastructure penetration testing or red teaming (not web-only)
- Hands-on with Windows AD exploitation, network pivoting, lateral movement
- Comfortable working across the entire attack chain—from recon to post-exploitation
- Experience with tools like BloodHound, Mimikatz, Metasploit, Cobalt Strike
- Familiarity with attacker tradecraft and simulation tools
- Proficient in:
- Python – for automation and tooling
- PowerShell – for Windows attack scenarios
- Bash – for Linux environments and scripting
- Worked in Linux-based systems during offensive operations
- Familiarity with cloud environments: AWS, Azure, GCP (attacks or research)
- Used LLMs (like ChatGPT) for research or tooling enhancement
- Created internal labs, written attack POCs, or contributed to open-source offensive tooling
- An attacker mindset: creative, curious, and always digging deeper
- Experienced enough to operate independently—but still a team player
- Able to research, prototype, and write production-grade offensive content
* Salary range is an estimate based on our AI, ML, Data Science Salary Index 💰
Tags: AWS Azure ChatGPT GCP GPT Kubernetes Linux LLMs Open Source Python Research Security Testing
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.