Crossing Hurdles

Offensive & Defensive Security Specialist | $95/hr Remote

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for an Offensive & Defensive Security Specialist with a contract length of flexible, project-based hours at a pay rate of $85–$95/hr. Key skills required include extensive cybersecurity experience, SIEM proficiency, and familiarity with MITRE ATT&CK.
🌎 - Country
United States
💱 - Currency
$ USD
-
💰 - Day rate
760
-
🗓️ - Date
March 3, 2026
🕒 - Duration
Unknown
-
🏝️ - Location
Remote
-
📄 - Contract
Unknown
-
🔒 - Security
Unknown
-
📍 - Location detailed
United States
-
🧠 - Skills detailed
#AI (Artificial Intelligence) #Cybersecurity #Splunk #Defender #Documentation #Scala #Alation #Security #Cloud
Role description
Position: Cyber Security Expert (Red Team / Blue Team) Type: Hourly Contract Compensation: $85–$95/hour Location: Remote Commitment: Flexible | Project-based Role Responsibilities • Apply real-world defensive and offensive cybersecurity expertise to evaluate and stress-test AI systems built for threat detection, incident response, and attack simulation. • Investigate and analyze real or simulated incidents such as phishing, ransomware, lateral movement, and privilege escalation. • Review logs and telemetry from SIEM, EDR/XDR, firewall, cloud, and identity systems. • Map adversary behaviors using frameworks such as MITRE ATT&CK and assess detection quality, triage decisions, and response workflows. • Analyze attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration. • Simulate adversarial thinking to identify detection gaps, bypass techniques, and evasion strategies. • Evaluate AI-generated investigations for technical accuracy, operational realism, and logical reasoning. • Provide structured feedback to refine benchmarks for detection, triage, and attack simulation accuracy. Requirements • Strong experience of cybersecurity experience in roles such as SOC Analyst (Level II/III), Incident Responder, Detection Engineer, Threat Hunter, Red Team Operator, Penetration Tester, or Security Consultant (Offensive Security). • Hands-on experience responding to or conducting real-world security incidents. • Strong Blue Team experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, Elastic), EDR/XDR tools (e.g., CrowdStrike, Defender, Carbon Black), log analysis, event correlation, and network traffic analysis (e.g., Wireshark, Zeek, tcpdump). • Familiarity with MITRE ATT&CK mapping and detection engineering practices. • Red Team experience with penetration testing methodologies, adversary emulation, exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents), privilege escalation, lateral movement, and evasion techniques. • Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus. • Strong written documentation skills explaining investigative and adversarial reasoning. • Ability to think from both attacker and defender perspectives and perform structured, logical analysis. Application Process • Upload resume • Interview • Submit form