HamburgerMenu
hirist

Windows Security Research Engineer - C/C++ Programming

C3iHub
Delhi NCR
2 - 7 Years

Posted on: 20/01/2026

Job Description

Description :

We are seeking a highly skilled Windows Security Engineer to join our advanced offensive security research team. The ideal candidate will have deep expertise in Windows internals, strong C/C++ development skills, and hands-on experience conducting low-level attack research, kernel exploitation, and evasion of modern Windows defenses.

This role focuses on adversary simulation, Windows kernel attack surface research, and offensive tooling development to assess and improve the resilience of enterprise Windows environments.

Responsibilities :

Offensive Security Research & Exploitation :

- Research historical and emerging Windows vulnerabilities (CVE analysis, exploitability assessment)

- Analyze Windows kernel attack surfaces including :

1. System calls

2. Drivers

3. Object manager

4. Memory manager

- Develop proof-of-concept exploits for Windows kernel and privileged components (controlled research environment)

- Study and bypass modern Windows exploit mitigations (DEP, ASLR, CFG, KASLR)

Kernel & Low-Level Tooling :

- Build low-level tooling in C/C++ for :

1. Privilege escalation

2. Kernel callback abuse

3. Token manipulation

- Develop user-mode to kernel-mode interaction tools using IOCTL interfaces

Evasion & Defense Bypass Research :

- Research and simulate EDR / AV evasion techniques

- Analyze and bypass :

1. PatchGuard (Kernel Patch Protection)

2. Driver Signature Enforcement (DSE)

3. AMSI and ETW-based detections

Adversary Simulation & Red Team Operations :

- Simulate advanced persistent threat (APT) techniques targeting Windows environments

- Conduct privilege escalation and post-exploitation research on Windows systems

- Emulate real-world attack chains from userland to kernel

Documentation & Reporting :

- Document vulnerabilities, exploitation paths, and attack methodologies clearly

- Produce technical reports for internal stakeholders and leadership

- Contribute to internal red team playbooks and attack frameworks

Eligibility :

Education :

- Bachelors degree in Computer Science, Cybersecurity, or related field

- Equivalent hands-on offensive security experience will be considered

Technical Skills :

Windows Internals :

- Strong understanding of Windows architecture, including :

1. Windows kernel architecture


2. Process, thread, and token internals

3. Virtual memory management

4. System Service Descriptor Table (SSDT) concepts


Programming :

- Proficiency in C and C++ (kernel-mode and user-mode)

- Experience developing Windows drivers and low-level tools

- Familiarity with inline assembly and reverse engineering concepts

Offensive Security Experience :

- Experience with :

1. Windows vulnerability research and exploit development

2. Privilege escalation techniques

3. Kernel exploitation fundamentals

- Strong understanding of :

1. Windows security boundaries

2. Attack surface reduction strategies

3. Red team tradecraft at OS level

Tools & Platforms :

- Experience with offensive and analysis tools such as :

1. Debuggers - WinDbg , x64Dbg , GDB

2. IDA Pro / Ghidra

3. Sysinternals Suite

4. Process Monitor / Process Explorer

5. Custom exploit frameworks and fuzzers

Certifications (Preferred) :

- OSCP, OSEP, OSED, CRTO, or equivalent offensive certifications

- Any advanced Windows or red teamfocused certifications are a plus


info-icon

Did you find something suspicious?

Similar jobs that you might be interested in