Yesterday
Unspecified
Mid Level Career (5+ yrs experience)
No Traveling
IT - Networking
Job Title: Malicious Network Activities Expert
Location: Remote
Clearance: None required (Secret preferred but not required). Must be a US Citizen
Employment Type: Full Time
Education: Bachelor’s in Network Security, Information Technology, or a related field
Work Status: Remote
Salary: $130,000–$170,000
Benefits: Competitive salary and bonus structure, comprehensive health insurance, 401(k) with company match, generous PTO and flexible work options.
Application: Apply here or on our Careers Page @ Careers - Metronome, or email your resume to Careers@wearemetronome.com
Description: Metronome is seeking an experienced and detail-oriented Malicious Network Activities Expert to support the evaluation of large language models (LLMs) in the field of network security. This role is ideal for a cybersecurity professional with a deep understanding of network traffic patterns, threat detection, and offensive security tooling. You’ll help create challenging, real-world evaluation scenarios that test an LLM’s ability to detect and reason through malicious network behavior.
This is a hands-on role focused on building evaluation materials—such as packet captures and question-answer datasets—that explore an LLM’s ability to infer exploits, detect protocol misuse, and identify anomalies in traffic patterns.
Key Responsibilities:
Design unencrypted traffic scenarios for anomaly detection
Create question-answer pairs that test an LLM’s detection of malicious network activity
Generate packet captures (pcaps) of known exploits using tools like Metasploit
Develop protocol-specific challenges involving request-response patterns
Craft pattern recognition scenarios based on packet content
Design semantic and inferential reasoning prompts based on network behavior
Reverse engineer attack signatures from traffic artifacts
Evaluate LLMs’ capabilities in real-time network analysis tasks
Required Skills
4+ years in network security analysis or intrusion detection
Strong understanding of network protocols and attack behaviors
Hands-on experience with packet analysis tools (e.g., Wireshark)
Experience with exploitation frameworks like Metasploit
Ability to generate and analyze malicious traffic patterns
Familiarity with cybersecurity threat detection methodologies
Ability to reverse engineer attacks and infer vulnerabilities from traffic evidence
Strong analytical and documentation skills
Desired Skills (Optional)
Certifications (Preferred):
CISSP – Certified Information Systems Security Professional
GCIA – GIAC Certified Intrusion Analyst
The ideal candidate should be able to create evaluation materials that test a model's ability to perform real-time analysis of network traffic patterns. They should specifically be able to generate packet captures of known exploits using tools like Metasploit, then develop prompts that challenge the model to "work backward" from the traffic patterns to identify the specific exploit or vulnerability being leveraged in the attack.
Location: Remote
Clearance: None required (Secret preferred but not required). Must be a US Citizen
Employment Type: Full Time
Education: Bachelor’s in Network Security, Information Technology, or a related field
Work Status: Remote
Salary: $130,000–$170,000
Benefits: Competitive salary and bonus structure, comprehensive health insurance, 401(k) with company match, generous PTO and flexible work options.
Application: Apply here or on our Careers Page @ Careers - Metronome, or email your resume to Careers@wearemetronome.com
Description: Metronome is seeking an experienced and detail-oriented Malicious Network Activities Expert to support the evaluation of large language models (LLMs) in the field of network security. This role is ideal for a cybersecurity professional with a deep understanding of network traffic patterns, threat detection, and offensive security tooling. You’ll help create challenging, real-world evaluation scenarios that test an LLM’s ability to detect and reason through malicious network behavior.
This is a hands-on role focused on building evaluation materials—such as packet captures and question-answer datasets—that explore an LLM’s ability to infer exploits, detect protocol misuse, and identify anomalies in traffic patterns.
Key Responsibilities:
Design unencrypted traffic scenarios for anomaly detection
Create question-answer pairs that test an LLM’s detection of malicious network activity
Generate packet captures (pcaps) of known exploits using tools like Metasploit
Develop protocol-specific challenges involving request-response patterns
Craft pattern recognition scenarios based on packet content
Design semantic and inferential reasoning prompts based on network behavior
Reverse engineer attack signatures from traffic artifacts
Evaluate LLMs’ capabilities in real-time network analysis tasks
Required Skills
4+ years in network security analysis or intrusion detection
Strong understanding of network protocols and attack behaviors
Hands-on experience with packet analysis tools (e.g., Wireshark)
Experience with exploitation frameworks like Metasploit
Ability to generate and analyze malicious traffic patterns
Familiarity with cybersecurity threat detection methodologies
Ability to reverse engineer attacks and infer vulnerabilities from traffic evidence
Strong analytical and documentation skills
Desired Skills (Optional)
Certifications (Preferred):
CISSP – Certified Information Systems Security Professional
GCIA – GIAC Certified Intrusion Analyst
The ideal candidate should be able to create evaluation materials that test a model's ability to perform real-time analysis of network traffic patterns. They should specifically be able to generate packet captures of known exploits using tools like Metasploit, then develop prompts that challenge the model to "work backward" from the traffic patterns to identify the specific exploit or vulnerability being leveraged in the attack.
group id: 10443198