Ethical Hacker / Application Security Expert - Red Team

8 - 13 years

30 - 35 Lacs

Posted:1 week ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

  • Red Teaming & Attack Simulation:

    • Plan and execute realistic attack simulations against our web, mobile, and desktop applications to identify weaknesses and bypass security controls.
    • Develop and utilize custom exploits, tools, and techniques to mimic the tactics, techniques, and procedures (TTPs) of advanced threat actors.
    • Conduct social engineering campaigns to assess employee awareness and identify potential vulnerabilities.
  • Advanced Penetration Testing:

    • Perform in-depth penetration tests of applications, networks, and systems, using both automated tools and manual techniques.
    • Identify and exploit complex vulnerabilities, including those related to application logic, authentication, authorization, and data handling.
    • Develop detailed penetration test reports with clear and actionable recommendations for remediation.
  • Secure Code Review (Offensive Perspective):

    • Conduct code reviews from an offensive perspective, identifying potential vulnerabilities that could be exploited by attackers.
    • Provide developers with guidance on secure coding practices and vulnerability remediation techniques.
    • Develop and maintain secure coding guidelines and checklists.
  • Vulnerability Research & Exploit Development:

    • Stay up-to-date on the latest security threats, vulnerabilities, and exploit techniques.
    • Conduct vulnerability research to identify new and emerging threats.
    • Develop custom exploits and tools to test and demonstrate the impact of vulnerabilities.
  • SDLC Integration & Security Advocacy:

    • Collaborate with development teams to integrate security testing and red teaming activities into the SDLC.
    • Participate in design reviews and provide security guidance on application architecture and design.
    • Promote a security-conscious culture within the development organization.
  • Vulnerability Management (Validation & Verification):

    • Validate and verify the effectiveness of vulnerability remediation efforts.
    • Retest remediated vulnerabilities to ensure they have been properly addressed.
  • Security Tooling & Automation (Offensive Tools):

    • Evaluate, recommend, and customize offensive security tools and technologies.
    • Automate red teaming and penetration testing processes to improve efficiency and coverage.

Mock Interview

Practice Video Interview with JobPe AI

Start Cyber Security Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Java Skills

Practice Java coding challenges to boost your skills

Start Practicing Java Now

RecommendedJobs for You

hyderabad, ahmedabad, bengaluru

hyderabad, ahmedabad, bengaluru