Job Description
Spark Shield Technology is on a mission to proactively defend digital assets by identifying security flaws before attackers do. As an Ethical Hacker, you will simulate real-world cyberattacks, exploit vulnerabilities, and work with teams to enhance security resilience. If you thrive in offensive security, red teaming, and penetration testing, this role is for you! Job description : β’ Simulate Advanced Attacks β Execute penetration testing, exploit vulnerabilities, and conduct adversary emulation on networks, applications, and cloud environments. β’ Hunt for Hidden Threats β Perform deep security research, uncover zero-day vulnerabilities, and continuously test the resilience of our systems. β’ Develop Custom Exploits & Tools β Create custom scripts, payloads, and attack methodologies to bypass security controls and improve testing efficiency. β’ Analyze & Report Exploitability β Document findings with technical & executive-level reports, providing detailed remediation plans to mitigate risks. β’ Strengthen Cyber Defenses β Work closely with blue teams, developers, and security engineers to implement countermeasures and improve overall security posture. β’ Monitor Emerging Cyber Threats β Stay ahead of the latest attack vectors, hacking techniques, and TTPs (Tactics, Techniques, and Procedures) used by real-world adversaries. Requirements : β’ Hands-on expertise in penetration testing for web applications, networks, APIs, and cloud environments. β’ Deep understanding of attack methodologies (privilege escalation, lateral movement, social engineering, etc.). β’ Proficiency with exploitation frameworks (Metasploit, Cobalt Strike, Empire, etc.) and custom exploit development. β’ Strong knowledge of security misconfigurations, encryption flaws, and post-exploitation techniques. β’ Advanced experience with security tools (Burp Suite, Nmap, Wireshark, Gobuster, Hydra, SQLmap). β’ Proficiency in scripting & automation (Python, Bash, PowerShell) for security assessments. β’ Familiarity with MITRE ATT&CK framework, OWASP Top 10, NIST security guidelines. β’ Security certifications (OSCP, CRTP, CEH, GPEN, CISSP) are a plus but not required. #JobVacancy #WeAreHiring #RemoteJobs #EthicalHacker #CyberSecurityJobs #InfoSecJobs #PenetrationTesting #BugBounty #RedTeam #WhiteHatHacker #CyberSecurityCareers #SecurityAnalyst #CyberJobs Apply tot his job Apply tot his job