About the Job Role :
We are seeking a skilled Offensive Security Researcher with 34 years of hands-on experience in penetration testing, red teaming, vulnerability research, and exploit development. The ideal candidate will be responsible for identifying and exploiting security weaknesses across a variety of systems, applications, and networks to simulate real-world cyberattacks.
This role is critical in strengthening our organization's security posture by providing actionable insights, supporting incident response, and contributing to continuous security improvements. You will work closely with security engineers, blue teams, and development teams to bridge gaps between offense and defense.
Responsibilities :
- Conduct comprehensive penetration tests (VAPT) on web applications, APIs, networks, mobile apps, and cloud environments.
- Perform red teaming exercises and adversary simulation to assess detection and response capabilities.
- Identify and exploit vulnerabilities in custom and third-party applications, operating systems, and hardware.
- Research and develop exploits or payloads to demonstrate risk impact on both Windows and Linux environments.
- Create detailed technical reports and executive summaries with remediation recommendations.
- Collaborate with blue teams to improve defensive controls based on offensive insights.
- Continuously research emerging threats, attack techniques (TTPs), and security trends to keep tools and techniques up-to-date.
- Develop custom attack tools and scripts where necessary to aid in engagements.
- Support incident response teams during active breaches with offensive techniques such as attacker simulation and pivoting.
- Participate in threat modeling and security architecture reviews from an attackers perspective.
Required Qualifications :
Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or equivalent practical experience.3-4 years of professional experience in offensive security, penetration testing (VAPT), or red teaming.Strong proficiency with penetration testing tools such as Burp Suite, Metasploit, Cobalt Strike, Nmap, Wireshark, Nessus, and others.Deep understanding of MITRE ATT&CK framework, OWASP Top 10, CWE, and CVSS scoring.Solid knowledge of network protocols, operating system internals (Windows / Linux), and cloud infrastructures (AWS, Azure, GCP).Practical experience in exploit development, reverse engineering, or binary analysis is a strong plus.Scripting and automation skills using Python, Bash, PowerShell, or similar languages.Familiarity with social engineering techniques and phishing campaigns is a plus.Relevant certifications are highly desirable (e.g., OSCP, CEH etc.,).ref : hirist.tech)