Own end-to-end offensive security assessments—web/API/mobile, infra/cloud, and Active Directory—and ship findings that matter. Act as the anchor for most pen-test delivery while contributing to purple-team detection tuning
Responsibilities
1. Assessment Delivery
- Plan and execute scoped tests across web, API, mobile, external/internal networks, AD, and AWS/Azure/GCP
- Emulate APT-style adversaries when scope allows (priv-escalation, lateral movement, data-exfil).
2. Impact Validation & Remediation
- Prove practical business impact (auth bypass, sensitive-data exposure, lateral paths).
- Draft remediation steps that developers/administrators can realistically implement
3. Content & Automation
- Build and maintain reusable checks: Nuclei/Burp/ZAP templates, Semgrep rules, custom scripts (Python/PowerShell/Bash).
- Automate evidence collection and reporting where it eliminates grunt work.
4. Engagement Leadership (rotational)
- Own scoping calls, daily stand-ups, mid-engagement risk reviews, and final report sign-off
- Enforce ROE and quality gates (evidence completeness, exploit reproducibility)
5. Purple-Team Rotation
Map top attacker TTPs to detections with Blue Team; validate coverage, tune SIEM/EDR rules, and document gaps
6. Research & Tooling
Track emerging TTPs, EDR bypass techniques, and cloud IAM abuses; integrate the useful ones into playbooks.
Qualifications
Must-have skills:
Offensive fundamentals:
- Solid OWASP/API testing, AD abuse basics (Kerberoasting, ACL misconfigs).
- Cloud IAM misconfig patterns across AWS, Azure, GCP (e.g., privilege-escalation paths, cross-account pivot).
- Manual exploitation discipline—no blind scanner drop-offs.
Tooling proficiency: Metasploit, Burp Suite, Nmap, BloodHound, Covenant/Sliver (or equivalent), plus custom scripting in Python/PowerShell/Bash.
Evidence quality: Screenshots, packet captures, logs—well-annotated and reproducible.
Reporting & comms: Concise technical write-ups and executive summaries; comfortable leading risk calls.
Certifications (preferred, not mandatory): OSCP, OSEP, CRTO, GXPN, or equivalent proven experience.
Nice to have skills:
- Exploit development (e.g., custom payloads, fuzzing)
- Experience bypassing modern EDR/XDR stacks
- Conference presentations or published research
Soft skills:
- Strong proficiency in both written and spoken English.
- Adaptability to thrive in dynamic, fast-paced environments and remote work settings.
- Effective team player with excellent collaboration and interpersonal skills.
- Ability to perform under pressure with a positive attitude and a focus on team success.
- Demonstrates high levels of responsibility, reliability, and accountability.
- Willingness and ability to travel internationally when required.