Description : Job Summary :
We are seeking a passionate and detail-oriented Network / Infrastructure Pentester with 4+ years of hands-on experience in manual security assessments. The ideal candidate will have strong expertise in identifying, exploiting, and reporting vulnerabilities in internal and external infrastructure, networks, firewalls, VPNs, and other critical assets. This role focuses on manual testing techniques, not just tool-driven scans, and requires deep technical understanding of networks, protocols, and system-level exploits.
Key Responsibilities :
- Perform manual infrastructure and network penetration testing (internal and external).
- Assess firewalls, routers, switches, VPNs, load balancers, servers, etc., for misconfigurations and vulnerabilities.
- Conduct port scanning, banner grabbing, service enumeration, and protocol-level analysis.
- Exploit discovered vulnerabilities using manual methods and custom scripts (e.g., Python, Bash).
- Identify and exploit common misconfigurations (e.g., SMB shares, weak SNMP strings, default credentials).
- Analyze and exploit network services (DNS, SMTP, FTP, SSH, RDP, etc.)
- Test for segmentation flaws and lateral movement opportunities within internal networks.
- Assess cloud infrastructure (AWS / Azure / GCP) from a network and IAM perspective (bonus).
- Generate detailed, clear, and actionable technical and executive-level reports.
- Collaborate with system / network administrators and DevOps teams to explain findings and remediation steps.
- Stay updated with emerging threats, exploits, and TTPs (Tactics, Techniques, and Procedures).
Technical Skills & Tools Expected :
Manual Pentesting & Recon :
Hands-on with nmap, netcat, telnet, dig, tcpdump, etc.Strong understanding of TCP / IP, DNS, DHCP, NAT, VPNs, firewalls, and network topologies.Deep understanding of network protocols and their weaknesses (e.g., ARP spoofing, DHCP poisoning).Manual enumeration of services (e.g., SMB, LDAP, RDP, HTTP headers).Exploitation & Tools :
Manual use of Metasploit (not auto-pwn).Familiar with CrackMapExec, Responder, Impacket, Kerberos attacks.Use of Hydra, John the Ripper, or Hashcat for credential testing.Privilege escalation techniques in Linux / Windows environments.Vulnerability Analysis :
Ability to interpret and validate findings from automated tools (e.g., Nessus, Nexpose, Qualys).Manual verification of CVEs, misconfigurations, and weak services.Understanding of OWASP Top 10 for Infrastructure, CIS Benchmarks, and MITRE ATT&CK.Reporting & Documentation :
Strong skills in documenting PoC screenshots, risk rating, CVSS scoring.Ability to create clear, concise remediation guidance.Preferred Certifications (not mandatory but an advantage) :
OSCP, CRTP, CRTE, eCPPT, CPT, CEH (v11 or above).Soft Skills :
Strong analytical thinking and problem-solving skills.Excellent verbal and written communication.Ability to work independently and in team settings.Curious mindset with a passion for offensive security.Bonus Skills (Not Required but Nice to Have) :
Experience with Active Directory attacks (Kerberoasting, Pass-the-Hash, etc.)Cloud security pentesting (AWS IAM misconfigurations, S3 bucket checks).Familiarity with scripting (Python, Bash, PowerShell) for automation or exploitation.Red team exposure or purple team engagements.(ref : hirist.tech)