ABOUT YOU
Writing and demonstrating proof of concept work from an exploitation or attack perspective
Academic degree in Cybersecurity, Information Technology, Computer Science, or related fields
A self- starter, independent with minimal supervision and strong hands- on experience in penetration testing for various tech stacks, including cloud environments.
Access control methodologies, network/host intrusion detection, vulnerability management tools, patch management tools, penetration testing tools, and AV solutions
Experience in container and Kubernetes testing and working knowledge of security best practices
Experience in cloud security, especially AWS, and a good understanding of DevSecOps principles, including Continuous integration and continuous deployment practices (CI/CD)
Building and employing modules and tailored payloads for common testing frameworks or tools
Web, Mobile Applications, and Operating Systems exploitation or enumeration techniques utilized today range from injection, privilege escalation, buffer overflows, fuzzing, and scanning
5+ years of in- depth, hands- on working knowledge in penetration testing and vulnerability management in a global environment. Out of this a minimum of 3 years of professional experience as a lead penetration tester, reverse engineer, researcher, or threat analyst
A self- starter, independent with minimal supervision and strong hands- on experiences in penetration testing for various tech stacks, including cloud environment
Hardware hacking or building custom hardware for exploitation
Detailed- oriented, Strong deductive reasoning, critical thinking, and problem- solving skills
IOS and Android reverse engineering, disassembling, decompiling, and root/jailbreak detection evasion
Strong communication skills (oral and written)
Ability to work in a fast- paced team environment
Knowledge of the threat and vulnerability landscape, including malware, emerging threats, attacks, and vulnerability management
Networking topologies, protocol usage, and enterprise hardware, including switches, routers, and firewalls, and their roles in security
Programming languages such as Objective- C, Java, SWIFT, and Assembly, one/or more of the ing