Career 2017-11-17T20:15:59+00:00

Looking for Penetration Tester

We are looking for Penetration Tester who will have experience performing hands-on penetration testing, security test planning, and vulnerability analysis; focusing on automated and manual exploitation of applications, networks, and system level designs and implementations. This position requires a strong ethical hacking mindset with proven professional experience in assessing diverse network and system architectures in a comprehensive manner. The successful candidate will enjoy working in a dynamic, responsive, and collaborative environment and be dedicated to the success of customers. Experience and detailed technical knowledge in information security engineering, secure architecture development, system and network security, authentication and security protocols, applied cryptography, and application security is essential. Must have the ability to communicate with and distill information from technical resources during formal and informal meetings. Must be able to work both independently and as a part of team testing efforts.

Required Skills/Qualifications

Knowledge of vulnerability management and scanning best practices.
Experience with Unix (preferably Red Hat) administration skills.
The individual should be comfortable with all forms of daily server administration.
Experience with Windows server administration.
Knowledge and experience in basic web application configuration in particular experience with the Linux, Apache, MySQL, PHP (LAMP) stack.
Knowledge of and experience in performing application assessments.

Desired Skills

Overall 4 + years of Information Security experience.
Offensive pen testing experience.
Knowledge of software exploitation (web, client-server, mobile, and wireless) on modern operating systems.
Familiarization with XSS, SSJS, filter bypassing, SQL Injection, etc.
Familiarity with interpreting log output from networking devices, operating systems and infrastructure services.
Familiarity with common reconnaissance, exploitation, and post exploitation frameworks.

Qualification Required

Bachelor’s or Masters degree highly desirable.
Certifications of Inc. School of Cyber Security “Certified Expert” certifications and OSCP added advantage.

Send your profile at:

Looking for a first-class business plan consultant? 

Get A Quote