Job Description

Location: Hyderabad/ Bangalore


Required skills:

  • At least 8+ years of experience in penetration testing and red team operations.
  • Deep understanding of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, devices, security mechanisms and how they operate.
  • Strong understanding of network security threats including APT, botnets, Distributed Denial of Service (DDoS) attacks, worms, and network exploits.
  • Adversary Emulation: Design and execute end-to-end red team engagements, mimicking the TTPs of specific threat actors relevant to our industry.
  • Full-Kill Chain Execution: Lead all phases of an engagement: Reconnaissance (OSINT), Initial Access (Phishing , Social Engineering), Persistence, Lateral Movement, and Objective Achievement (Data Exfiltration).
  • Stealth Operations: Conduct operations while avoiding detection by EDR, SIEM, and SOC analysts. Develop custom payloads and bypass techniques for modern security controls.
  • Infrastructure Management: Build and maintain covert "attack infrastructure," including C2 (Command & Control) servers, redirectors, and domain fronting.
  • Collaborative Debriefs: Participate in "Purple Team" exercises. Instead of just throwing a report over the fence, work alongside the Blue Team to help them build better detection signatures.
  • Tool Development: Write custom scripts and tools (in Python, Go, or PowerShell) to automate repetitive tasks or exploit unique vulnerabilities where off-the-shelf tools fail.
  • Reporting: Translate complex technical findings into actionable executive summaries that highlight business risk, not just technical flaws.
  • Excellent written and verbal communication skills and have demonstrated ability to present material to senior officials.
  • Highly self-motivated requiring little direction.
  • Demonstrates creative/out-of-the-box thinking and good problem-solving skills.
  • Sense of urgency and attention to detail
  • Flexible to provide coverage in US morning hours on a need-basis, and as required


Desirable skills:

● Strong knowledge of an enterprise architecture

● Ability to obtain a strong and ongoing understanding of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols.

● Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.

● Understanding of cloud-based architectures and highly distributed big data architectures

● Experience with application security testing tools, such as the Metasploit framework and Burp Suite

● One or more of these certifications

o CEH: Certified Ethical Hacker

o CPT: Certified Penetration Tester

o CEPT: Certified Expert Penetration Tester

o GPEN: GIAC Certified Penetration Tester

o OSCP: Offensive Security Certified Professional

Apply for this Position

Ready to join ? Click the button below to submit your application.

Submit Application