About Us
We are a premier cybersecurity consultancy, blending advanced offensive and defensive strategies to safeguard our customers.
With a team known for its contributions to cybersecurity research at platforms like Black Hat and DEF CON, we excel at identifying and mitigating sophisticated threats. Large enterprises from a range of industries trust us for advanced adversarial emulation and for critical support in managing their cyber frameworks. Governments trust us with classified projects, relying on our precision and discretion to handle sensitive information securely.
We’re a small group that makes a big impact. Our deep technical expertise and our commitment to clients continues to fuel our success, and with success comes growth – we’re currently searching for an intermediate
Pen Tester…
Role Profile
Working remotely, in this position your mandate will be to assess the security posture of our clients by identifying and exploiting vulnerabilities in networks, applications, and systems. You will conduct controlled security assessments, execute attack simulations, and analyze security weaknesses. You’ll document findings and collaborate with colleagues and client teams to support remediation efforts. You will also contribute to analysis and reporting that provides actionable insights for improving defenses.
This is an outstanding opportunity to join an accelerating startup, work with cutting-edge tech, and tackle critical problems on high-stakes engagements.
Key Responsibilities
- Conduct web, network, mobile, and API penetration tests to identify vulnerabilities.
- Support team assessments, simulating real-world attack scenarios.
- Develop and execute custom exploits, scripts, and attack chains.
- Conduct source code reviews for security weaknesses in applications.
- Assess cloud security in AWS, Azure, and GCP, as well as containerized environments like Docker and Kubernetes.
- Collaborate with blue teams, SOC analysts, and developers to remediate findings.
- Write detailed technical reports and present findings to technical and non-technical stakeholders.
- Stay updated on zero-day vulnerabilities, APT tactics, and emerging threats.
- Participate in CTFs, security research, and bug bounty programs to refine skills.
Candidate Profile
As an ideal candidate, you're skilled in pen testing and have exposure to adversarial emulation and custom exploit development. You’re a natural hacker with a founder’s mindset, eager to learn and collaborate, and prone to thrive in a startup environment.
Key Qualifications
- 3-5 years of hands-on penetration testing experience.
- Proficiency in manual testing techniques beyond automated scanning.
- Strong knowledge of OWASP Top 10, MITRE ATT&CK, and CVSS scoring
- Experience with Active Directory attacks, privilege escalation, and lateral movement.
- Skilled in the use of some or all of: Burp Suite, Nessus, Metasploit, Kali Linux
- Familiarity with scripting in Python, PowerShell, Bash, or Ruby
- Understanding of secure coding practices and DevSecOps principles.
- Excellent communication and interpersonal skills
Nice-to-Haves
- Experience in cloud security testing
- Knowledge of hardware hacking, IoT security, or reverse engineering.
- Familiarity with SOC operations, threat hunting, and incident response.
- Previous experience in bug bounty programs or published security research.
Powered by JazzHR
YagkqmqjqE