Connecting linkedin

W1siziisimnvbxbpbgvkx3rozw1lx2fzc2v0cy9oyw1sew4td2lsbglhbxmvanbnl2jhbm5lci1kzwzhdwx0lwpvyi5qcgcixv0

Job

Web App Pentester

  • Location

    United States

  • Sector:

    Technology

  • Job type:

    Permanent

  • Salary:

    140,000-150,000

  • Contact:

    Jovan Ortiz

  • Contact email:

    j.ortiz@hamlynwilliams.com

  • Salary high:

    0

  • Salary low:

    0

  • Published:

    11 days ago

  • Expiry date:

    2022-06-09

Web Application Penetration Tester (2+ Years Testing Experience)

You must be a U.S. Citizen or Permanent Resident in order to qualify.

 

Role:

 

  • You should have experience in at least one of the following areas: penetration testing, red teaming, and security testing for mobile and web applications.

 

  • Expert knowledge of a wide range of operating systems and databases; experience with programming in a mainstream language such as Java, C, C++, C#, ASP, .NET, Python, or a similar language

 

  • Manual penetration testing experience above and beyond running automated tools is required, understanding of OWASP testing guides and MITRE ATT&CK.

 

  • Advanced written and verbal presentation skills essential.

 

  • Able to work collaboratively in a team environment

 

Responsibilities:

 

  • Perform vulnerability scan, assessment, and penetration testing on a variety of web and mobile applications, external and internal networks, and Active Directory and cloud environments

 

  • Be a part of the Offensive Security team that is working on phishing campaigns and red teaming engagements

 

  • Be aware of new attack vectors and work proactively to mitigate them

 

  • Exploit new vulnerabilities

 

  • (Editing publicly available exploits)

 

  • Collaborate with other penetration testers and offensive security team members

 

  • Assist in educating clients on exploited vulnerabilities and remediation strategies to protect against future exploits or attacks

 

  • Research and learn new concepts, methodologies, and tools, investigate new threats

 

  • Creating case studies based on your latest security research