About this role
Tetrad Digital Integrity is seeking a Malicious Network Activities Expert to develop evaluation content that tests models or test subjects on recognizing malicious network behavior. The work involves building realistic scenarios, generating packet captures, and crafting questions that assess anomaly detection and exploit inference from network evidence.
Key Responsibilities
- Create question-answer pairs testing detection of malicious network activities
- Design unencrypted traffic analysis scenarios
- Generate packet captures of known exploits and test identification of specific exploit or vulnerability
- Craft prompts for protocol-specific anomaly detection and request-response understanding
- Develop realistic challenges requiring pattern recognition in packet content and inference of exploit behavior
Technical Overview
Hands-on network security expertise is required to analyze network traffic, identify attack signatures, and generate realistic malicious/unw encrypted traffic scenarios. The role uses packet capture generation (including known exploits) with offensive security tooling such as Metasploit and relies on packet analysis with Wireshark, emphasizing protocol anomaly detection and forensic-style reasoning.
Ideal Candidate
The ideal candidate is a senior network security professional with 4+ years of experience in network security analysis or intrusion detection. They are certified with GIAC Certified Intrusion Analyst (GCIA), GIAC Network Forensic Analyst (GNFA), Wireshark Certified Network Analyst (WCNA), and Offensive Security Certified Professional (OSCP), and can generate packet captures and realistic malicious traffic scenarios using tools like Metasploit.
Must-Have Skills
4+ years in network security analysis or intrusion detectionStrong background in network security and traffic analysisExperience with common attack patterns and their network signaturesUnderstanding of network protocols and their normal vs. abnormal behaviorsFamiliarity with packet analysis tools (e.g.Wireshark)Proficiency with exploitation frameworks (e.g.Metasploit)Ability to capture and document network traffic containing specific vulnerabilitiesAbility to create realistic but challenging scenariosVery Strong understanding of network protocolsexperience with network monitoring tools
Tools & Platforms
WiresharkMetasploit
Required Skills
Malicious network activitiesnetwork security analysisintrusion detectionanalyzing network trafficidentifying attack signaturespacket capturesunencrypted traffic analysispacket analysisWiresharkprotocol anomaly detectionrequest-response dynamicsknown exploitsMetasploitexploitation frameworksreverse engineering attacks from network traffic evidencecybersecurity threat detection methodologiesnetwork monitoring tools
Hard Skills
malicious network activitiesnetwork security analysisanalyzing network trafficidentifying attack signaturescrafting realistic test scenariospacket capturesunencrypted traffic scenariospattern recognition in packet contentrequest-response dynamicsprotocol-specific anomaly detectionknown exploitsnetwork traffic containing vulnerabilitiesWiresharkintrusion detectionnetwork protocolsnormal vs abnormal behaviorspacket analysisexploitation frameworksMetasploitOffensive Security Certified Professional (OSCP) skillsreverse engineering attacks from network traffic evidencecybersecurity threat detection methodologiesoffensive security toolinggenerating packet captures using tools like Metasploitcreating evaluation materials for real-time network traffic patterns
Soft Skills
detail-orientedability to create challenging evaluation contentanalytical reasoningability to work with testing and evaluation workflows
Certifications
Required
GIAC Certified Intrusion Analyst (GCIA)GIAC Network Forensic Analyst (GNFA)Wireshark Certified Network Analyst (WCNA)Offensive Security Certified Professional (OSCP)
Keywords for Your Resume
Malicious Network Activities Expertmalicious network activitiesnetwork security analysisintrusion detectionanalyzing network trafficpacket capturesunencrypted trafficpacket analysisWiresharkWireshark Certified Network Analyst (WCNA)attack signaturescommon attack patternsnetwork protocolsnormal vs. abnormal behaviorsprotocol-specific anomaly detectionrequest-response dynamicsknown exploitsvulnerabilitiesreverse engineeringreverse engineering attacksthreat detection methodologiesexploitation frameworksMetasploitGIAC Certified Intrusion Analyst (GCIA)GIAC Network Forensic Analyst (GNFA)Offensive Security Certified Professional (OSCP)GCIAGNFAWCNAOSCP
Deal Breakers
Must have 4+ years in network security analysis or intrusion detection, Must hold GIAC Certified Intrusion Analyst (GCIA), GIAC Network Forensic Analyst (GNFA), Wireshark Certified Network Analyst (WCNA), and Offensive Security Certified Professional (OSCP), Must have hands-on experience analyzing network traffic and producing packet captures
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile