Responsibilities
Develop approaches to identify vulnerabilities and understand impact surface
Perform penetration tests on web applications, network devices, and cloud infrastructures
Pinpoint methods and entry points that attackers may use to exploit vulnerabilities or weaknesses
Search for weaknesses in common software, web applications and proprietary systems
Research, evaluate, document and discuss findings along with recommendation to fix and/or mitigate the vulnerabilities
Review and provide feedback for information security fixes
Establish improvements for existing security services, including hardware, software, policies and procedures
Identify areas where improvement is needed in security education and awareness for users
Be sensitive to corporate considerations when performing testing (. minimise downtime and loss of employee productivity)
Stay updated on the latest malware and security threats
Communicate findings to both technical staff and executive leadership
Skills
Should have attackers mindset and coding skill required to infiltrate systems
Research inclination to go deeper and develop custom exploitation approaches
Comprehensive knowledge of web security(OWASP and more), including forensics, systems analysis and more
Insight into how hackers exploit the human element to gain unauthorised access to secure systems
Clear understanding of how computer security breaches can disrupt business, including the financial and managerial implications
Exceptional problem-solving skills
Communications skills to document and share your findings
(preferred) certification in Cyber security or bug bounty experience
(preferred) Understanding of CIS, NIST and other cyber security frameworks
(preferred) exposure to open-source tools for vulnerability assessment (Nmap, SqlMap, Zap etc.) exposure to authorization systems