✦ Luna Orbit — Cybersecurity

Malicious Network Activities Expert

at Tetrad Digital Integrity LLC

📍 Remote, US Remote Posted April 14, 2026
Type Not Specified
Experience senior
Exp. Years 4+ years
Education Bachelor's degree in Network Security, Information Technology, or a related field.
Category Cybersecurity

Tetrad Digital Integrity is seeking a Malicious Network Activities Expert to develop evaluation content that tests models or test subjects on recognizing malicious network behavior. The work involves building realistic scenarios, generating packet captures, and crafting questions that assess anomaly detection and exploit inference from network evidence.

  • Create question-answer pairs testing detection of malicious network activities
  • Design unencrypted traffic analysis scenarios
  • Generate packet captures of known exploits and test identification of specific exploit or vulnerability
  • Craft prompts for protocol-specific anomaly detection and request-response understanding
  • Develop realistic challenges requiring pattern recognition in packet content and inference of exploit behavior

Hands-on network security expertise is required to analyze network traffic, identify attack signatures, and generate realistic malicious/unw encrypted traffic scenarios. The role uses packet capture generation (including known exploits) with offensive security tooling such as Metasploit and relies on packet analysis with Wireshark, emphasizing protocol anomaly detection and forensic-style reasoning.

The ideal candidate is a senior network security professional with 4+ years of experience in network security analysis or intrusion detection. They are certified with GIAC Certified Intrusion Analyst (GCIA), GIAC Network Forensic Analyst (GNFA), Wireshark Certified Network Analyst (WCNA), and Offensive Security Certified Professional (OSCP), and can generate packet captures and realistic malicious traffic scenarios using tools like Metasploit.

4+ years in network security analysis or intrusion detectionStrong background in network security and traffic analysisExperience with common attack patterns and their network signaturesUnderstanding of network protocols and their normal vs. abnormal behaviorsFamiliarity with packet analysis tools (e.g.Wireshark)Proficiency with exploitation frameworks (e.g.Metasploit)Ability to capture and document network traffic containing specific vulnerabilitiesAbility to create realistic but challenging scenariosVery Strong understanding of network protocolsexperience with network monitoring tools
WiresharkMetasploit
Malicious network activitiesnetwork security analysisintrusion detectionanalyzing network trafficidentifying attack signaturespacket capturesunencrypted traffic analysispacket analysisWiresharkprotocol anomaly detectionrequest-response dynamicsknown exploitsMetasploitexploitation frameworksreverse engineering attacks from network traffic evidencecybersecurity threat detection methodologiesnetwork monitoring tools
malicious network activitiesnetwork security analysisanalyzing network trafficidentifying attack signaturescrafting realistic test scenariospacket capturesunencrypted traffic scenariospattern recognition in packet contentrequest-response dynamicsprotocol-specific anomaly detectionknown exploitsnetwork traffic containing vulnerabilitiesWiresharkintrusion detectionnetwork protocolsnormal vs abnormal behaviorspacket analysisexploitation frameworksMetasploitOffensive Security Certified Professional (OSCP) skillsreverse engineering attacks from network traffic evidencecybersecurity threat detection methodologiesoffensive security toolinggenerating packet captures using tools like Metasploitcreating evaluation materials for real-time network traffic patterns
detail-orientedability to create challenging evaluation contentanalytical reasoningability to work with testing and evaluation workflows

Required

GIAC Certified Intrusion Analyst (GCIA)GIAC Network Forensic Analyst (GNFA)Wireshark Certified Network Analyst (WCNA)Offensive Security Certified Professional (OSCP)
Industry Cybersecurity
Job Function Build network-security evaluation materials using packet evidence to test detection and inference of malicious behavior.
Role Subtype Security Analyst
Tech Domains Cybersecurity, Networking / TCP-IP
Malicious Network Activities Expertmalicious network activitiesnetwork security analysisintrusion detectionanalyzing network trafficpacket capturesunencrypted trafficpacket analysisWiresharkWireshark Certified Network Analyst (WCNA)attack signaturescommon attack patternsnetwork protocolsnormal vs. abnormal behaviorsprotocol-specific anomaly detectionrequest-response dynamicsknown exploitsvulnerabilitiesreverse engineeringreverse engineering attacksthreat detection methodologiesexploitation frameworksMetasploitGIAC Certified Intrusion Analyst (GCIA)GIAC Network Forensic Analyst (GNFA)Offensive Security Certified Professional (OSCP)GCIAGNFAWCNAOSCP

Must have 4+ years in network security analysis or intrusion detection, Must hold GIAC Certified Intrusion Analyst (GCIA), GIAC Network Forensic Analyst (GNFA), Wireshark Certified Network Analyst (WCNA), and Offensive Security Certified Professional (OSCP), Must have hands-on experience analyzing network traffic and producing packet captures

Apply for this Position →

Get matched to jobs like this

Luna finds roles that fit your skills and career goals — no endless scrolling required.

Create a Free Profile