Job Description
Location: Hyderabad/ Bangalore
Required skills:
- At least 8+ years of experience in penetration testing and red team operations.
- Deep understanding of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, devices, security mechanisms and how they operate.
- Strong understanding of network security threats including APT, botnets, Distributed Denial of Service (DDoS) attacks, worms, and network exploits.
- Adversary Emulation: Design and execute end-to-end red team engagements, mimicking the TTPs of specific threat actors relevant to our industry.
- Full-Kill Chain Execution: Lead all phases of an engagement: Reconnaissance (OSINT), Initial Access (Phishing , Social Engineering), Persistence, Lateral Movement, and Objective Achievement (Data Exfiltration).
- Stealth Operations: Conduct operations while avoiding detection by EDR, SIEM, and SOC analysts. Develop custom payloads and bypass techniques for modern security controls.
- Infrastructure Management: Build and maintain covert "attack infrastructure," including C2 (Command & Control) servers, redirectors, and domain fronting.
- Collaborative Debriefs: Participate in "Purple Team" exercises. Instead of just throwing a report over the fence, work alongside the Blue Team to help them build better detection signatures.
- Tool Development: Write custom scripts and tools (in Python, Go, or PowerShell) to automate repetitive tasks or exploit unique vulnerabilities where off-the-shelf tools fail.
- Reporting: Translate complex technical findings into actionable executive summaries that highlight business risk, not just technical flaws.
- Excellent written and verbal communication skills and have demonstrated ability to present material to senior officials.
- Highly self-motivated requiring little direction.
- Demonstrates creative/out-of-the-box thinking and good problem-solving skills.
- Sense of urgency and attention to detail
- Flexible to provide coverage in US morning hours on a need-basis, and as required
Desirable skills:
● Strong knowledge of an enterprise architecture
● Ability to obtain a strong and ongoing understanding of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols.
● Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
● Understanding of cloud-based architectures and highly distributed big data architectures
● Experience with application security testing tools, such as the Metasploit framework and Burp Suite
● One or more of these certifications
o CEH: Certified Ethical Hacker
o CPT: Certified Penetration Tester
o CEPT: Certified Expert Penetration Tester
o GPEN: GIAC Certified Penetration Tester
o OSCP: Offensive Security Certified Professional
Apply for this Position
Ready to join ? Click the button below to submit your application.
Submit Application