Tech Lead – Adversary Emulation - Montréal, QC, CA
3 days ago

Job description
, consectetur adipiscing elit. Nullam tempor vestibulum ex, eget consequat quam pellentesque vel. Etiam congue sed elit nec elementum. Morbi diam metus, rutrum id eleifend ac, porta in lectus. Sed scelerisque a augue et ornare.
Donec lacinia nisi nec odio ultricies imperdiet.
Morbi a dolor dignissim, tristique enim et, semper lacus. Morbi laoreet sollicitudin justo eget eleifend. Donec felis augue, accumsan in dapibus a, mattis sed ligula.
Vestibulum at aliquet erat. Curabitur rhoncus urna vitae quam suscipit
, at pulvinar turpis lacinia. Mauris magna sem, dignissim finibus fermentum ac, placerat at ex. Pellentesque aliquet, lorem pulvinar mollis ornare, orci turpis fermentum urna, non ullamcorper ligula enim a ante. Duis dolor est, consectetur ut sapien lacinia, tempor condimentum purus.
Access all high-level positions and get the job of your dreams.
Similar jobs
+We are looking for a Red Team Operator to join our team of veteran hackers. The successful candidate will plan and execute remote operations dynamically emulating advanced threat actors to improve the detection and response capabilities of clients through long-term engagements. ...
1 month ago
We're currently searching for a GRC Consultant with a strong cybersecurity consulting background. · In this position your mandate is to ensure that our clients meet the stringent cybersecurity standards set by regulatory bodies in their industries and jurisdictions. · This is a c ...
1 month ago
We are a premier cybersecurity consultancy seeking a GRC Consultant with strong cybersecurity consulting background to ensure clients meet stringent cybersecurity standards. · To be successful in this role you will provide guidance and support to client organizations throughout t ...
1 month ago
We are a premier cybersecurity consultancy blending advanced offensive and defensive strategies to safeguard our customers.With a team known for its contributions to cybersecurity research at platforms like Black Hat and DEF CON we excel at identifying and mitigating sophisticate ...
1 month ago