Bachelor’s or Master’s in Computer Science, Cybersecurity, Engineering, or related field. At least 7 years in offensive or adversarial security (red teaming, pentesting, exploit development). At least 3 years leading technical teams or high-impact assessments. Deep interest or hands-on experience in securing AI/LLM systems. Proficiency in secure CI/CD practices, infrastructure-as-code, and cloud-native security (Azure preferred). Strong scripting/coding skills (e.g. Python, PowerShell). Experience with common offensive security tools (e.g. Burp, Nmap, BloodHound, Metasploit). Ability to clearly present technical findings and risk models to technical and non-technical stakeholders. Fluent English (B2 minimum).