Conduct web application penetration testing using established methodologies (e.g., OWASP).
Perform network penetration testing and identify system-level vulnerabilities.
Conduct hardware-level security assessments and penetration tests on embedded systems, PCBs, SoCs, firmware, and IoT devices.
Perform side-channel analysis, fault injection, and reverse engineering of hardware and firmware.
Analyze firmware images for vulnerabilities using both static and dynamic methods.
Analyse existing security measures and recommend improvements.
Document findings, provide detailed risk assessments, and deliver remediation strategies.
Advise on and implement security best practices across applications and infrastructure.
Collaborate with development and infrastructure teams to ensure secure design and implementation.
Stay current with evolving threats, vulnerabilities, and mitigation techniques.
If experienced, conduct mobile application penetration testing (preferred, not mandatory).
Requirements :
A degree in computer science, IT, systems engineering, or related qualification.
Core experience and profound knowledge in application and infrastructure security testing.
Strong understanding and hands on experience on application and infrastructure vulnerabilities, automated / manual testing, auditing and remediation techniques.
Strong understanding of OWASP Threats classification.
Experience with standard security tools such as Metasploit, SQLMap, Nmap, OWASP ZAP, Burp Suite etc.
Experience with network / infrastructure vulnerability assessment tools such as Nessus, Qualys etc.
Experience with establishing penetration testing procedures and processes.
Proficiency in any one of the scripting languages like Python, C++, Java, Ruby, Node, Go, and / or Power Shell.
Ability to work under pressure in a fast-paced environment.
Strong attention to detail with an analytical mind and outstanding problem-solving skills.
Great awareness of cybersecurity trends and hacking techniques.