ABOUT YOU
Building and employing modules and tailored payloads for common testing frameworks or tools
Knowledge of the threat and vulnerability landscape, including malware, emerging threats, attacks, and vulnerability management
Access control methodologies, network/host intrusion detection, vulnerability management tools, patch management tools, penetration testing tools, and AV solutions
5+ years of in- depth, hands- on working knowledge in penetration testing and vulnerability management in a global environment. Out of this a minimum of 3 years of professional experience as a lead penetration tester, reverse engineer, researcher, or threat analyst
Ability to work in a fast- paced team environment
Hardware hacking or building custom hardware for exploitation
Experience in container and Kubernetes testing and working knowledge of security best practices
A self- starter, independent with minimal supervision and strong hands- on experiences in penetration testing for various tech stacks, including cloud environment
Web, Mobile Applications, and Operating Systems exploitation or enumeration techniques utilized today range from injection, privilege escalation, buffer overflows, fuzzing, and scanning
Academic degree in Cybersecurity, Information Technology, Computer Science, or related fields
Programming languages such as Objective- C, Java, SWIFT, and Assembly, one/or more of the scripting languages, e.g., Perl, Python, PowerShell, or shell scripting
Writing and demonstrating proof of concept work from an exploitation or attack perspective
IOS and Android reverse engineering, disassembling, decompiling, and root/jailbreak detection evasion
Detailed- oriented, Strong deductive reasoning, critical thinking, and problem- solving skills
Strong communication skills (oral and written)
A self- starter, independent with minimal supervision and strong hands- on experience in penetration testing for various tech stacks, including cloud environments.
Networking topologies, protocol usage, and enterprise hardware, including switches, routers, and firewalls, and their roles in security
Experience in cloud security, especially AWS, and a good understanding of DevSecOps principles, including Continuous integration and continuous deployment practices (CI/CD)