Cybersecurity Expert for AI Training

G
Gramian Consulting GroupIT Professional Services
Bangladesh, Brazil, Colombia, Egypt, Ghana, India, Pakistan, Indonesia, Kenya, Nigeria, Turkey, Vietnam, 4 hours overlap with PSTContractSenior
Salary not disclosed
Apply NowOpens the employer's application page

Job Details

Experience
4+ years of experience in cybersecurity, application security, vulnerability research, or offensive security
Required Skills
DockerNode.jsPythonCybersecurityGoRustLinux

Requirements

  • 4+ years of experience in cybersecurity, application security, vulnerability research, or offensive security
  • Hands-on experience with vulnerability discovery, exploit development, secure code review, or patch validation
  • Strong understanding of web security, authentication, sessions, OAuth, JWT, SSRF, injection attacks, and access control vulnerabilities
  • Experience with cryptographic vulnerabilities, filesystem attacks, or privilege escalation scenarios
  • Experience using security tools such as SAST, fuzzers, IAST, or similar security testing frameworks
  • Strong coding skills in at least two of the following languages: Go, Python, Node.js, Rust
  • Experience working with Docker and containerized environments
  • Familiarity with Linux internals and system-level behavior
  • Experience with bug bounty programs, CTFs, red teaming, or CVE research is a strong plus

Responsibilities

  • Design vulnerable multi-component applications and security challenge environments across languages such as Go, Python, Node.js, or Rust
  • Develop realistic exploit chains combining multiple vulnerability categories and attack vectors
  • Build deterministic evaluation environments using Docker and automated validation tooling
  • Create security-focused test cases and verification logic for vulnerability detection and remediation workflows
  • Review and analyze AI-generated outputs to identify gaps in reasoning, security understanding, or exploit detection
  • Develop adversarial scenarios involving misleading documentation, obfuscated code, edge cases, and hidden attack paths
  • Model real-world vulnerability classes inspired by CVEs, bug bounty findings, and production security incidents
  • Ensure evaluation tasks remain scalable, reproducible, and resistant to contamination from public datasets
  • Collaborate with cross-functional teams working on AI evaluation, benchmarking, and automated testing systems
View Full Description & ApplyYou'll be redirected to the employer's site
View details
Apply Now