Job Description:
The primary objectives of the Security Penetration Tester are to deliver and enhance various security services provided to both internal and external systems.
The services include security assessments of applications (API, Mobile, Web application, LLM) and infrastructure, Internal and external Penetration Testing, Segmentation Testing, security design reviews as well as risk assessments. This is a hands-on role, requiring technical skills from the hardware to the application layer.
Key Responsibilities:
• Perform application and infrastructure penetration tests,
• Perform security reviews of application designs, source code and deployments as required, covering all types of applications (web application, web services, mobile applications, thick client applications)
• Participate in Security Assessments of networks, systems, and applications
• Work on improvements for provided security services, including the continuous enhancement of existing methodology material and supporting assets
Job Requirements:
• Bachelor’s degree or higher, technical discipline preferred
• Minimum three years of working experience in Penetration Testing, Mobile application, API, Web Services and Application security
• Good Achievement in one or more of the following (Hack the Box, Hacker One, CVE, Bug Bounty, CTF, etc.)
• Working knowledge of Security principles, techniques, and technologies
• Good understanding of network protocols, design, and operations
• Strong analytical skills and efficient problem solving
• Willingness to learn
• Good English communication skills (written and oral)
Preferable skills:
• Penetration Testing, Mobile Application and Web Application security Certificates such as OSCP, OSEP, OSWA, OSWE, eLearnSecurity certifications, etc.
• Secure Code review
• Application development background and security knowledge – example of languages includes JS, Type Script, Angler, Swift, C, C#, C++, Java
• Vulnerability Management experience
• Experience with various security tools and products (Burp Suite, Metaspolit, Kali Linux, Fortify, GitHub, Codeql, SonarQube etc.)
• Good understanding of the components of a secure DLC/SDLC
• Vulnerability analysis and application reversing skills
• Understanding of cryptography principles
