About the company
The DFINITY Foundation is a major contributor to the Internet Computer blockchain.
Job Summary
Key Responsibilities:
šRed Team Strategy & Execution šLead and design sophisticated Red Team operations targeting Internet Computer Protocol, governance, subnets, nodes, and system dApps šDevelop adversary emulation plans to test both platform and infrastructure defenses, identifying weaknesses before they can be exploited šExploit Development & Vulnerability Research šResearch, develop, and test advanced exploits against the Internet Computer Protocol and infrastructure šMaintain an internal repository of exploits, scripts, and tools for advanced offensive security operations Infrastructure Security šStrengthen the security of Internet Computer Operating Systems (ICOS) running on virtual machines by implementing advanced hardening measures šPerform vulnerability assessments and penetration tests on the ICOS environment and the overall Internet Computer infrastructure to identify and mitigate risks šHarden and assess security for internal Kubernetes clusters and associated services, ensuring robust defense mechanisms against container-based attacks šPerform security testing across cloud-native infrastructures, CI/CD pipelines, and microservices environments, identifying lateral movement paths and privilege escalation risks šTool Development & Automation šBuild and maintain custom offensive security tools for exploit delivery, post-exploitation automation, and Red Team simulations šDevelop secure operational tools to streamline complex engagements and support security monitoring, threat detection, and incident handling šPartner with cross-functional teams, including blockchain developers, DevOps, and infrastructure engineers, to embed security best practices throughout the development lifecycle šLead incident response efforts involving blockchain or internal systems, conducting thorough post-mortems and implementing mitigation strategies šPublish security advisories and report CVEs
Requirements:
šExtensive experience planning and executing Red Team engagements in complex, distributed environments, simulating advanced persistent threats (APTs) across blockchain and traditional infrastructure šSkilled in adversary emulation, lateral movement techniques, privilege escalation, and exfiltration tactics šProven experience in identifying and exploiting vulnerabilities specific to blockchain ecosystems, including distributed consensus mechanisms, smart contract execution, and inter-node communication šStrong understanding of kernel-level vulnerabilities, hypervisor security, and virtualized environments