Apply

Security Penetration Tester (APAC) - Vietnam

Posted 29 days agoViewed

View full description

💎 Seniority level: Middle, 3+ years

📍 Location: Vietnam

🔍 Industry: SaaS

🏢 Company: Employment Hero👥 501-1000💰 $166,333,052 Series F over 1 year agoManagement Information SystemsHuman ResourcesSaaSFinanceEmployee Benefits

⏳ Experience: 3+ years

🪄 Skills: Cloud ComputingCybersecurityREST APICommunication SkillsAnalytical SkillsCI/CDProblem SolvingLinuxDevOpsAttention to detailWritten communicationJSONTechnical supportScripting

Requirements:
  • A minimum of 3 years’ experience in a penetration testing environment
  • Possessing OSCP is a must, with other offensive security certificates highly favourable
  • Strong communication and presentation skills
  • In-depth knowledge of common offensive security tools (Burp Suite, Cobalt Strike, Metasploit)
  • Strong consultative skills, enabling effective communication of complex concepts to both technical and non
  • Meticulous attention to detail
  • A strong desire to learn and expand knowledge in the field of information security
Responsibilities:
  • Conduct penetration testing on web applications, networks, mobile platforms, and cloud environments
  • Simulate real-world cyberattacks, including vulnerability assessments, social engineering, and physical security evaluations
  • Identify, analyse, and document security vulnerabilities and recommend mitigation strategies
  • Work closely with IT teams, engineers, and management to implement security measures and close gaps
  • Stay updated on the latest cybersecurity trends, attack techniques, and security tools
  • Prepare detailed reports that clearly communicate findings, risks, and remediation plans to both technical and non-technical stakeholders
  • Participate in red team exercises, security audits, and incident response simulations
  • Identify gaps in people, processes, and technologies
  • Vulnerability research on certain high-value applications or systems
  • Develop proof-of-concept exploits to demonstrate how vulnerabilities can be exploited
Apply