

Crossing Hurdles
Offensive & Defensive Security Specialist | $95/hr Remote
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for an Offensive & Defensive Security Specialist with a contract length of flexible, project-based hours at a pay rate of $85–$95/hr. Key skills required include extensive cybersecurity experience, SIEM proficiency, and familiarity with MITRE ATT&CK.
🌎 - Country
United States
💱 - Currency
$ USD
-
💰 - Day rate
760
-
🗓️ - Date
March 3, 2026
🕒 - Duration
Unknown
-
🏝️ - Location
Remote
-
📄 - Contract
Unknown
-
🔒 - Security
Unknown
-
📍 - Location detailed
United States
-
🧠 - Skills detailed
#AI (Artificial Intelligence) #Cybersecurity #Splunk #Defender #Documentation #Scala #Alation #Security #Cloud
Role description
Position: Cyber Security Expert (Red Team / Blue Team)
Type: Hourly Contract
Compensation: $85–$95/hour
Location: Remote
Commitment: Flexible | Project-based
Role Responsibilities
• Apply real-world defensive and offensive cybersecurity expertise to evaluate and stress-test AI systems built for threat detection, incident response, and attack simulation.
• Investigate and analyze real or simulated incidents such as phishing, ransomware, lateral movement, and privilege escalation.
• Review logs and telemetry from SIEM, EDR/XDR, firewall, cloud, and identity systems.
• Map adversary behaviors using frameworks such as MITRE ATT&CK and assess detection quality, triage decisions, and response workflows.
• Analyze attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration.
• Simulate adversarial thinking to identify detection gaps, bypass techniques, and evasion strategies.
• Evaluate AI-generated investigations for technical accuracy, operational realism, and logical reasoning.
• Provide structured feedback to refine benchmarks for detection, triage, and attack simulation accuracy.
Requirements
• Strong experience of cybersecurity experience in roles such as SOC Analyst (Level II/III), Incident Responder, Detection Engineer, Threat Hunter, Red Team Operator, Penetration Tester, or Security Consultant (Offensive Security).
• Hands-on experience responding to or conducting real-world security incidents.
• Strong Blue Team experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, Elastic), EDR/XDR tools (e.g., CrowdStrike, Defender, Carbon Black), log analysis, event correlation, and network traffic analysis (e.g., Wireshark, Zeek, tcpdump).
• Familiarity with MITRE ATT&CK mapping and detection engineering practices.
• Red Team experience with penetration testing methodologies, adversary emulation, exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents), privilege escalation, lateral movement, and evasion techniques.
• Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus.
• Strong written documentation skills explaining investigative and adversarial reasoning.
• Ability to think from both attacker and defender perspectives and perform structured, logical analysis.
Application Process
• Upload resume
• Interview
• Submit form
Position: Cyber Security Expert (Red Team / Blue Team)
Type: Hourly Contract
Compensation: $85–$95/hour
Location: Remote
Commitment: Flexible | Project-based
Role Responsibilities
• Apply real-world defensive and offensive cybersecurity expertise to evaluate and stress-test AI systems built for threat detection, incident response, and attack simulation.
• Investigate and analyze real or simulated incidents such as phishing, ransomware, lateral movement, and privilege escalation.
• Review logs and telemetry from SIEM, EDR/XDR, firewall, cloud, and identity systems.
• Map adversary behaviors using frameworks such as MITRE ATT&CK and assess detection quality, triage decisions, and response workflows.
• Analyze attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration.
• Simulate adversarial thinking to identify detection gaps, bypass techniques, and evasion strategies.
• Evaluate AI-generated investigations for technical accuracy, operational realism, and logical reasoning.
• Provide structured feedback to refine benchmarks for detection, triage, and attack simulation accuracy.
Requirements
• Strong experience of cybersecurity experience in roles such as SOC Analyst (Level II/III), Incident Responder, Detection Engineer, Threat Hunter, Red Team Operator, Penetration Tester, or Security Consultant (Offensive Security).
• Hands-on experience responding to or conducting real-world security incidents.
• Strong Blue Team experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, Elastic), EDR/XDR tools (e.g., CrowdStrike, Defender, Carbon Black), log analysis, event correlation, and network traffic analysis (e.g., Wireshark, Zeek, tcpdump).
• Familiarity with MITRE ATT&CK mapping and detection engineering practices.
• Red Team experience with penetration testing methodologies, adversary emulation, exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents), privilege escalation, lateral movement, and evasion techniques.
• Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus.
• Strong written documentation skills explaining investigative and adversarial reasoning.
• Ability to think from both attacker and defender perspectives and perform structured, logical analysis.
Application Process
• Upload resume
• Interview
• Submit form





