drjobs Penetration Tester

Penetration Tester

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Pune - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

General Penetration Testing: Perform tests across web mobile and API applications internal and external networks wireless environments and physical access controls.

Red Team Operations: Plan execute and report on operations including assumed breach initial access lateral movement persistence and data exfiltration.

Cloud Penetration Testing: Conduct assessments across AWS Azure and GCP identifying misconfigurations privilege escalation paths identity attacks and container security issues.

Offensive Tooling: Use and customize tools such as Cobalt Strike Outflank Core Impact Silver BloodHound Burp Suite develop and utilize custom tooling; and develop custom scripts for post-exploitation and evasion.

Threat Simulation: Develop realistic threat scenarios based on MITRE ATT&CK APT tactics and current breach trends.

Reporting: Write detailed high-quality reports outlining technical vulnerabilities and exploitation techniques severity levels steps to reproduce and actionable remediation steps.

Client Communication: Brief clients on findings and provide strategic guidance on remediation overall risk reduction and tactics to increase security posture.

Methodology Development: Contribute to the advancement of internal testing methodologies tooling creation and improvements and red team infrastructure.

Security Research: Stay current with emerging threats CVEs offensive tactics and evolving cloud security techniques.

Skill Development: Perform ongoing research analysis and testing to enhance individual and team technical capabilities.

Engagement Scoping: Assist in defining scope estimating effort and drafting statements of work (SOWs) including recommending tailored solutions for client needs.

Mentorship: Coach and mentor less experienced staff or those less experienced in specific expertise areas to support professional development and service excellence.

Team Training: Train colleagues on areas of expertise and develop repeatable learning paths to support scalable team growth.

Content Development: Contribute to creating blog posts articles marketing or training materials and participating in webinars or customer conferences.

Heres What Youll Bring To The Table

Bachelors degree in Computer Science Information Technology or a related field or equivalent experience.

7 years of professional experience in penetration testing and offensive security consulting.

At least 2 years of experience conducting red team operations.

At least 2 years of practical experience in cloud penetration testing (AWS Azure etc.) including identification and exploitation of misconfigurations and IAM vulnerabilities.

Generalized penetration testing experience in areas such as infrastructure penetration testing and manual web mobile or API penetration testing.

Ability to simulate real-world adversarial techniques and develop creative attack chains in controlled environments.

Strong understanding of network protocols Active Directory privilege escalation techniques

Demonstrated experience with C2 frameworks (Cobalt Strike Silver etc.)

Proficiency in scripting or coding languages (Python PowerShell Bash etc.)

Employment Type

Full-time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.