We are looking a CTF Developer to build realistic, high-quality labs for Bugthrive. You will design challenges that mirror real-world attack vectors and defensive scenarios.
Core Responsibilities:
*
Challenge Design
: Develop labs across Web, Reverse Engineering, Forensics, Crypto, OSINT, and Pwn.
*
Environment Building
: Create Boot2Root machines, standalone systems, and complex Active Directory (AD) environments.
*
Blue Team Scenarios
: Design labs focused on log analysis, malware investigation, and incident response.
*
QA & Documentation
: Write comprehensive internal solution guides and conduct end-to-end testing to eliminate unintended solve paths.
*
Deployment
: Work with DevOps to containerize and deploy labs.
Technical Skills & Requirements:
*
Docker
: Expert-level containerization for challenge deployment.
*
Prior Experience
: Proven track record in CTF development or lab creation.
*
Documentation
: Ability to write clear, structured technical walkthroughs.
*
Systems
: Deep proficiency in Linux and Windows (Offensive/Defensive).
*
Exploitation
: Strong grasp of priv-esc, lateral movement, and AD attack chains.
*
Defense
: Familiarity with SIEM, EDR, and log forensic analysis.
Technologies & Tools
*
Offensive
: Metasploit, Burp Suite, BloodHound, Impacket, Cobalt Strike.
*
Defensive
: Volatility, Splunk, Elastic (ELK), Wireshark.
*
Infrastructure
: Vagrant, Ansible, or Terraform (preferred).
Role Details
*
Type
: Contract / Project-based
*
Location
: Remote
*
Pay
: Per machine/challenge submitted
*
Reports to
: Lab Division Lead
Why Join Us?
*
Impact
: Your labs will train the next generation of security professionals.
*
Creative Freedom
: Full autonomy over challenge design and vulnerability implementation.
*
Scale
: Work with a rapidly growing platform in the cybersecurity education space.