In this vital role, you will be responsible for conducting authorized security tests on IT infrastructure to evaluate the strength of its systems against potential cyberattacks. You will perform security testing, including penetration testing and code reviews, to identify and exploit vulnerabilities. The ideal candidate will have a deep understanding of common vulnerabilities and penetration testing methodologies, using both automated tools and manual techniques to simulate real-world attacks. You will then work with the organization to prioritize, remediate, and report on identified issues, strengthening the overall security posture.
Roles & Responsibilities
- Security Testing & Vulnerability Assessment : Conduct security testing on networks, systems, applications, and infrastructure. You will use automated tools ( Burp Suite, OWASP ZAP, Acunetix ) and manual techniques to identify weaknesses such as SQL Injection, Cross-Site Scripting (XSS) , and Cross-Site Request Forgery (CSRF) .
- Exploitation & Post-Exploitation : Attempt to exploit discovered vulnerabilities to demonstrate their impact and prove their existence. You will perform advanced post-exploitation tasks to simulate real-world attack scenarios, such as retrieving sensitive data or elevating user privileges.
- Documentation & Reporting : Document identified vulnerabilities in detail, explaining how they were found, their severity, and their potential impact. You will include proof-of-concept (PoC) for critical vulnerabilities and offer actionable solutions for fixing them.
- Prioritization & Communication : Use risk-based prioritization to categorize issues by their severity and business impact. You will present findings to stakeholders, security teams, and management, explaining the business risk and potential impacts.
- Mentorship & Collaboration : Guide and support junior team members by offering technical advice and conducting code reviews. You will also work with third-party security vendors for audits and external assessments.
- Continuous Learning : Continuously learn about the latest vulnerabilities, exploits, and security trends to enhance the organization's security posture.
Technical Skills
Strong knowledge of common vulnerabilities ( OWASP Top 10, SANS Top 25 ), network protocols, encryption standards, and common penetration testing methodologies ( ISSAF, OSSTMM, PTES ).Familiarity with tools like Burp Suite, OWASP ZAP , and Metasploit .A deep understanding of web application architecture, databases, and authentication mechanisms.Familiarity with industry standards and compliance requirements ( e.g., PCI-DSS, NIST, ISO 27001 ).Proficiency in scripting and automation ( Python, Bash ) is a plus.Experience with threat intelligence and incorporating emerging threats into penetration testing practices is a plus.Qualifications
A Bachelor's degree in Computer Science, Cybersecurity, or an Information Systems-related field.Relevant certifications such as eJPT, eCPPT, eWPT, OSCP, OSWA, or GWAPT are preferred.Soft Skills
Problem-Solving : The ability to think critically and creatively when testing and attempting to exploit vulnerabilities.Communication : Strong communication skills to present findings to a variety of audiences and guide junior team members.Proactiveness : A high degree of initiative and self-motivation to continuously learn and stay updated with the latest security trends.Skills Required
Penetration Testing, Security Testing, Documentation, Testing Methodologies, Web Application Architecture, Python, Bash