***REVERSERS WANTED*** Hey remember a few weeks ago when I had a cool space-related project and was looking for some US-based fuzzing folk for a few months, knowledge of Rust required and paying around $100/hr? Well it's going great and we're growing the team, now also looking for people skilled in low-level bug discovery, strong knowledge of Assembly and familiarity with embedded systems overlap (you'll be working alongside an embedded engineer as you look for bugs / build fuzzers). It's a need-to-know kinda thing so message me if interested and/or share with your awesome reverser friends - there are now a few spots open! The picture is one I took last week of one of our engineers working remote. ***US CITIZENS ONLY*** I don’t make the rules
RedBlue Security
Computer and Network Security
Austin, Texas 3,305 followers
Secure Your Future
About us
Since its inception, RedBlue Security has been building a global, community-based, high-caliber security recruitment practice modeled around confidentiality, integrity and availability. From Linkedin and other common social media outlets to IRC channels and deep web forums, we abandon the boring job-board trawling for a far more exhilarating, far-reaching and sector relevant search process. We have represented ex-TAO members, Pwn2Own winners, PPP Members and other DEF CON CTF winners, drone hackers, kernel-level exploit developers, Black Hat trainers, various other industry heavyweights and many more besides. We place security professionals predominantly within the following sub-sectors: Information Security Penetration Testing ( Network, Web Application, Mobile, Hardware, Social Engineering ) Vulnerability / Security Research & Exploit Development Offensive / Defensive Security Engineering (Red Team / Blue Team) Computer Network Operations - Attack ( CNA ), Defense ( CND ), Exploitation ( CNE ) Malware Analysis & Reverse Engineering Incident Response & Digital Forensics Threat Intelligence, SOC & SIEM Encryption & Cryptography Cryptocurrencies & Blockchain Governance, Risk & Compliance ( GRC / Audit ) C-Level & Executive Sales & Business Development
- Website
-
https://redbluesecurity.com
External link for RedBlue Security
- Industry
- Computer and Network Security
- Company size
- 2-10 employees
- Headquarters
- Austin, Texas
- Type
- Privately Held
- Founded
- 2015
- Specialties
- Information Security Recruitment, Social Engineering, Penetration Testing, Exploit Development, Vulnerability Research, Private Military Contracting, Executive Search, Defense Contracting, Cybersecurity, and Defense Recruitment
Locations
-
Primary
100 Congress Ave
Suite 2000
Austin, Texas 78701, US
-
152 City Road
London, England EC1V 1, GB
Employees at RedBlue Security
Updates
-
Picture this. You're as relaxed as our friend here, a top-tier hiring manager unwinding in a cozy mountain cabin, yet your mind is on the mission—securing the cybersecurity dream team that legends are made of. From technical maestros with clearance levels that rival the cabin's altitude, to strategic leaders who navigate the digital landscape with ease, we're the bridge between you and the elite talent you need. Why play a game of digital defense with anything less than the Avengers of cybersecurity? We understand that behind every serene hiring manager is a fierce competitor, ready to elevate their team from good to legendary. Whether you're bolstering your lineup of technical gurus or seeking the next visionary CISO, Director, or VP, we've got the talent that not only meets the brief but redefines it. Aggressive? Sure. Effective? Absolutely. With a sense of humor to boot, because let's face it, in the cyber world, if you're not laughing, you're not winning. Let's make your next talent acquisition the stuff of industry lore. After all, when you're as comfortable in your hiring strategy as you are in that armchair by the fire, you're not just playing the game; you're setting the high score. Ready to turn your cybersecurity challenges into your triumph? Let’s chat. 🛡️🔒💼 #CybersecurityDreamTeam #HiringLegends #SecureSuccess #Cybersecurity #Recruiting
-
This could be you. On the beach, not worrying about bringing on new talent. Let RedBlue find your talent so you don't have to. #CISO #Cybersecurity
-
Entering civilian life after serving can be difficult. For all of those you fighting an internal work, we appreciate you.
Veteran | Mental Health Advocate | Time Person of the Year 2003/2006 | Content Does Not Reflect My Employer
Post-#military imposter syndrome was very real… at least for me. I doubted myself and my ability to keep up with my civilian counterparts. I would often stress about tasks and put up imaginary barriers. You shouldn’t doubt yourself as a #veteran. Sure, your upbringing was a little different, but that’s what makes you unique. Share some of those healthy traits you learned while in service. Learn some of the new things the civilian world has to offer. Don’t hear a sound when you press the 👍
-
Uncover the critical breach in the Department of Interior's watchdog through TechCrunch's latest report, revealing a sophisticated hack that exposed sensitive cloud data and raises significant concerns for government cybersecurity. https://lnkd.in/eVUEmJEf
A government watchdog hacked a US federal agency to stress-test its cloud security | TechCrunch
https://techcrunch.com
-
RedBlue Security reposted this
The Lazarus Group, a well-known cybercriminal organization, has recently exploited a zero-day vulnerability in Windows to gain kernel privileges, a critical level of system access. This vulnerability, identified as CVE-2024-21338, was found in the appid.Sys AppLocker driver was patched by Microsoft in their February Patch Tuesday update following a report from Avast Threat Labs. The exploit allowed the Lazarus Group to establish a kernel read/write primitive, a fundamental capability for manipulating the operating system’s kernel memory.
Lazarus Hackers Exploited Windows 0-Day to Gain Kernel read/write Access
https://gbhackers.com
-
RedBlue Security reposted this
Russia, China And Others Used OpenAI’s Tools For Hacking State-sponsored hacking groups from Russia, China and other U.S. adversaries have been caught using OpenAI’s tools to better attack their targets, according to a report published Wednesday by Microsoft, amid concerns of possible cybersecurity threats as AI technology improves. https://lnkd.in/gJcafQYy
Microsoft Claims Russia, China And Others Used OpenAI’s Tools For Hacking
forbes.com
-
The Lazarus Group, a well-known cybercriminal organization, has recently exploited a zero-day vulnerability in Windows to gain kernel privileges, a critical level of system access. This vulnerability, identified as CVE-2024-21338, was found in the appid.Sys AppLocker driver was patched by Microsoft in their February Patch Tuesday update following a report from Avast Threat Labs. The exploit allowed the Lazarus Group to establish a kernel read/write primitive, a fundamental capability for manipulating the operating system’s kernel memory.
Lazarus Hackers Exploited Windows 0-Day to Gain Kernel read/write Access
https://gbhackers.com
-
The account of the Friends star, who died last October, had a post pinned to it urging people to donate to a fake foundation.
Matthew Perry's X account 'hacked by fraudsters' urging donation to fake foundation
news.sky.com