drjobs
Penetration Tester
drjobs Penetration Tester العربية

Penetration Tester

Employer Active

1 Vacancy
The job posting is outdated and position may be filled
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs

Job Location

drjobs

City - Australia

Monthly Salary

drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Req ID : 2838335

Hybrid (2x a Week WFH) Taguig Mid Shift

Minimum Criteria:

  • At least 2 years of proven experience in Penetration Testing
  • Education: A bachelors degree in a related field such as computer science information security or cybersecurity is commonly preferred but not always mandatory. Relevant industry experience can compensate for formal education requirements.
  • Technical Knowledge: A strong understanding of web technologies programming languages (e.g. HTML CSS JavaScript PHP Python) and web application architecture is essential. Knowledge of networking fundamentals operating systems and databases is also beneficial.
  • Web Application Security: Indepth knowledge of web application vulnerabilities common attack techniques and mitigation strategies. A strong understanding of OWASPs Top 10 vulnerabilities is crucial.
  • Infrastructure security: Working knowledge of different onprem and cloud builds (IaaS PaaS SaaS) indepth understanding of operating systems and their common flaws.
  • Penetration Testing Techniques: Proficiency in various penetration testing methodologies tools and frameworks. Experience with manual testing techniques automated vulnerability scanners and exploit frameworks is necessary.
  • Programming and Scripting: Proficiency in at least one programming language (e.g. Python Ruby or JavaScript etc.) to write custom scripts and tools. Understanding SQL queries for database testing is also important.
  • Analytical and ProblemSolving Skills: Ability to analyze complex web application environments identify vulnerabilities and exploit them. Strong problemsolving skills to understand attack vectors and recommend appropriate countermeasures.

Holds relevant industry certification/s or equivalent like the following:

  • CEH Certified Ethical Hacker
  • OSCP Offensive Security Certified Professional
  • GPEN GIAC Penetration Tester
  • PNPT Practical Network Penetration Tester
  • Burp Suite Certified Practitioner
  • eWAPT/eWAPTx eLearning Web Application Penetration Tester
  • Practical experience gained through participation in bug bounty programs capturetheflag (CTF) competitions and realworld projects can also be valuable in showcasing skills and expertise.

About the Role

A penetration tester is responsible for assessing the security of web applications and its underlying infrastructure to identify vulnerabilities and weaknesses that could be exploited by attackers. Their role involves conducting thorough assessments and penetration tests to uncover potential security risks and provide recommendations for mitigation.

The role will work closely alongside the rest of the Penetration Testing team Business units and other Cyber teams.

We are looking for a collaborative team player with good technical knowledge in web application and infrastructure penetration testing. The successful candidate will contribute to and work as part of a global multidisciplined security community with a clear vision and direction and topdown support across the business.

Responsibilities:

  • Vulnerability Assessment: Conduct comprehensive assessments of web applications and Infrastructure to identify security vulnerabilities such as crosssite scripting (XSS) SQL injection authentication flaws insecure configurations and poor host device and service configurations and use these to penetrate deeper into the application/server.
  • Penetration Testing: Performing controlled attacks on web applications. APIs infrastructure and simulate realworld hacking attempts and identify potential entry points for attackers. This involves utilizing various techniques tools and methodologies to exploit vulnerabilities and gain access.
  • Security Analysis: Analyzing the results of penetration tests to assess the severity of identified vulnerabilities their potential impact on the system and the business and the likelihood of exploitation.
  • Reporting and Documentation: Preparing detailed reports that document the findings including identified vulnerabilities attack vectors and recommendations for remediation. These reports typically outline the risks associated with each vulnerability and provide guidance on how to mitigate them.
  • Remediation Support: Collaborating with developers and system administrators to assist in the remediation of identified vulnerabilities. This may involve providing guidance on secure coding practices recommending security controls or validating the effectiveness of implemented fixes.
  • Stay Up to Date: Keeping abreast of the latest web application and infrastructure vulnerabilities attack techniques security tools and industry best practices. This includes staying informed about emerging threats and trends in web applications and infrastructure.
  • Ethical Approach: Conducting all testing and assessment activities within a legal and ethical framework ensuring that the organizations systems and data are not compromised or harmed during the process.
  • Continuous Improvement: Engaging in professional development activities such as attending conferences participating in training programs and obtaining relevant certifications to enhance knowledge and skills in cyber security.

Remote Work :

No

Employment Type

Full Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.