Related skills
python kali linux metasploit nessus owasp top 10📋 Description
- Conduct vulnerability assessments and pentesting on apps, networks, on-prem and cloud.
- Execute red team engagements to simulate real-world attacks.
- Document red team findings with remediation actions and after-action report.
- Proactive threat hunting through AI-based models.
- Collaborate with Product/DevOps/Engineering to embed secure practices.
- Investigate potential security breaches and support incident response.
🎯 Requirements
- 7-10 years in SOC, offensive security or pentesting.
- Proficiency with Burp Suite, Metasploit, Nessus, Nmap, Kali Linux, Qualys.
- OWASP Top 10 and attack vectors for Web/API/IoT.
- Vulnerability management tools and secure coding practices.
- Reverse engineering, exploit development, malware analysis; DevSecOps.
- BS/MS in CS or Info Security; CEH/OSCP/CSCP; Python, Bash, Ruby, PowerShell.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!