Posted on: 20/01/2026
Description :
We are seeking a highly skilled Windows Security Engineer to join our advanced offensive security research team. The ideal candidate will have deep expertise in Windows internals, strong C/C++ development skills, and hands-on experience conducting low-level attack research, kernel exploitation, and evasion of modern Windows defenses.
This role focuses on adversary simulation, Windows kernel attack surface research, and offensive tooling development to assess and improve the resilience of enterprise Windows environments.
Responsibilities :
Offensive Security Research & Exploitation :
- Research historical and emerging Windows vulnerabilities (CVE analysis, exploitability assessment)
- Analyze Windows kernel attack surfaces including :
1. System calls
2. Drivers
3. Object manager
4. Memory manager
- Develop proof-of-concept exploits for Windows kernel and privileged components (controlled research environment)
- Study and bypass modern Windows exploit mitigations (DEP, ASLR, CFG, KASLR)
Kernel & Low-Level Tooling :
- Build low-level tooling in C/C++ for :
1. Privilege escalation
2. Kernel callback abuse
3. Token manipulation
- Develop user-mode to kernel-mode interaction tools using IOCTL interfaces
Evasion & Defense Bypass Research :
- Research and simulate EDR / AV evasion techniques
- Analyze and bypass :
1. PatchGuard (Kernel Patch Protection)
2. Driver Signature Enforcement (DSE)
3. AMSI and ETW-based detections
Adversary Simulation & Red Team Operations :
- Simulate advanced persistent threat (APT) techniques targeting Windows environments
- Conduct privilege escalation and post-exploitation research on Windows systems
- Emulate real-world attack chains from userland to kernel
Documentation & Reporting :
- Document vulnerabilities, exploitation paths, and attack methodologies clearly
- Produce technical reports for internal stakeholders and leadership
- Contribute to internal red team playbooks and attack frameworks
Eligibility :
Education :
- Bachelors degree in Computer Science, Cybersecurity, or related field
- Equivalent hands-on offensive security experience will be considered
Technical Skills :
Windows Internals :
- Strong understanding of Windows architecture, including :
1. Windows kernel architecture
2. Process, thread, and token internals
3. Virtual memory management
4. System Service Descriptor Table (SSDT) concepts
Programming :
- Proficiency in C and C++ (kernel-mode and user-mode)
- Experience developing Windows drivers and low-level tools
- Familiarity with inline assembly and reverse engineering concepts
Offensive Security Experience :
- Experience with :
1. Windows vulnerability research and exploit development
2. Privilege escalation techniques
3. Kernel exploitation fundamentals
- Strong understanding of :
1. Windows security boundaries
2. Attack surface reduction strategies
3. Red team tradecraft at OS level
Tools & Platforms :
- Experience with offensive and analysis tools such as :
1. Debuggers - WinDbg , x64Dbg , GDB
2. IDA Pro / Ghidra
3. Sysinternals Suite
4. Process Monitor / Process Explorer
5. Custom exploit frameworks and fuzzers
Certifications (Preferred) :
- OSCP, OSEP, OSED, CRTO, or equivalent offensive certifications
- Any advanced Windows or red teamfocused certifications are a plus
Did you find something suspicious?
Posted by
Deepti (Upadhyay) Gupta
Assistant Manager Human Resources at C3iHub
Last Active: NA as recruiter has posted this job through third party tool.
Posted in
Semiconductor/VLSI/EDA
Functional Area
Embedded / Kernel Development
Job Code
1603844