Ethical Hacker | Remote
Spark Shield Technology is on a mission to proactively defend digital assets by identifying security flaws before attackers do. As an Ethical Hacker, you will simulate real-world cyberattacks, exploit vulnerabilities, and work with teams to enhance security resilience. If you thrive in offensive security, red teaming, and penetration testing, this role is for you!
Job description :
⢠Simulate Advanced Attacks ā Execute penetration testing, exploit vulnerabilities, and conduct adversary emulation on networks, applications, and cloud environments.
⢠Hunt for Hidden Threats ā Perform deep security research, uncover zero-day vulnerabilities, and continuously test the resilience of our systems.
⢠Develop Custom Exploits & Tools ā Create custom scripts, payloads, and attack methodologies to bypass security controls and improve testing efficiency.
⢠Analyze & Report Exploitability ā Document findings with technical & executive-level reports, providing detailed remediation plans to mitigate risks.
⢠Strengthen Cyber Defenses ā Work closely with blue teams, developers, and security engineers to implement countermeasures and improve overall security posture.
⢠Monitor Emerging Cyber Threats ā Stay ahead of the latest attack vectors, hacking techniques, and TTPs (Tactics, Techniques, and Procedures) used by real-world adversaries.
Requirements :
⢠Hands-on expertise in penetration testing for web applications, networks, APIs, and cloud environments.
⢠Deep understanding of attack methodologies (privilege escalation, lateral movement, social engineering, etc.).
⢠Proficiency with exploitation frameworks (Metasploit, Cobalt Strike, Empire, etc.) and custom exploit development.
⢠Strong knowledge of security misconfigurations, encryption flaws, and post-exploitation techniques.
⢠Advanced experience with security tools (Burp Suite, Nmap, Wireshark, Gobuster, Hydra, SQLmap).
⢠Proficiency in scripting & automation (Python, Bash, PowerShell) for security assessments.
⢠Familiarity with MITRE ATT&CK framework, OWASP Top 10, NIST security guidelines.
⢠Security certifications (OSCP, CRTP, CEH, GPEN, CISSP) are a plus but not required.
#JobVacancy #WeAreHiring #RemoteJobs #EthicalHacker #CyberSecurityJobs #InfoSecJobs #PenetrationTesting #BugBounty #RedTeam #WhiteHatHacker #CyberSecurityCareers #SecurityAnalyst #CyberJobs
Apply tot his job
Apply To this Job
Job description :
⢠Simulate Advanced Attacks ā Execute penetration testing, exploit vulnerabilities, and conduct adversary emulation on networks, applications, and cloud environments.
⢠Hunt for Hidden Threats ā Perform deep security research, uncover zero-day vulnerabilities, and continuously test the resilience of our systems.
⢠Develop Custom Exploits & Tools ā Create custom scripts, payloads, and attack methodologies to bypass security controls and improve testing efficiency.
⢠Analyze & Report Exploitability ā Document findings with technical & executive-level reports, providing detailed remediation plans to mitigate risks.
⢠Strengthen Cyber Defenses ā Work closely with blue teams, developers, and security engineers to implement countermeasures and improve overall security posture.
⢠Monitor Emerging Cyber Threats ā Stay ahead of the latest attack vectors, hacking techniques, and TTPs (Tactics, Techniques, and Procedures) used by real-world adversaries.
Requirements :
⢠Hands-on expertise in penetration testing for web applications, networks, APIs, and cloud environments.
⢠Deep understanding of attack methodologies (privilege escalation, lateral movement, social engineering, etc.).
⢠Proficiency with exploitation frameworks (Metasploit, Cobalt Strike, Empire, etc.) and custom exploit development.
⢠Strong knowledge of security misconfigurations, encryption flaws, and post-exploitation techniques.
⢠Advanced experience with security tools (Burp Suite, Nmap, Wireshark, Gobuster, Hydra, SQLmap).
⢠Proficiency in scripting & automation (Python, Bash, PowerShell) for security assessments.
⢠Familiarity with MITRE ATT&CK framework, OWASP Top 10, NIST security guidelines.
⢠Security certifications (OSCP, CRTP, CEH, GPEN, CISSP) are a plus but not required.
#JobVacancy #WeAreHiring #RemoteJobs #EthicalHacker #CyberSecurityJobs #InfoSecJobs #PenetrationTesting #BugBounty #RedTeam #WhiteHatHacker #CyberSecurityCareers #SecurityAnalyst #CyberJobs
Apply tot his job
Apply To this Job