Responsibilities: • Perform advanced penetration testing across applications, networks, and infrastructure
• Validate vulnerabilities and assess real-world impact under authorized conditions
• Analyze access paths and verify feasibility of system compromise
• Produce high-quality technical documentation with reproducible steps and evidence
• Collaborate with internal reviewers to maintain technical accuracy
• Maintain consistent weekly output aligned with quality standards
• Stay current with modern offensive security tools and methodologies.
Requirements: • Proven real-world offensive security experience in authorized environments (client engagements, internal Red Team, enterprise pentests);
• Demonstrated ability to obtain OS-level access (Linux/Windows) via real exploitation paths (RCE, command injection, insecure deserialization, file upload abuse, chained vulnerabilities);
• Strong post-exploitation knowledge, including:
- Enumeration after initial access;
- Privilege escalation (Linux/Windows);
- Credential access and token abuse;
- Lateral movement or internal pivoting (scope-dependent);
- Solid understanding of web, API, and network attack surfaces with vulnerability chaining ability;
• Hands-on experience with tools such as Burp Suite, Nmap, ffuf, Metasploit, linPEAS/winPEAS, and custom scripts;
• Ability to work independently in a remote, results-driven environment;
• Strong written English with clear, reproducible exploitation documentation.
⚡
Показать контакты
#Удаленка #ИБ
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →
Текст вакансии взят без изменений
Источник - Telegram канал. Название доступно после авторизации