Perform in-depth web application audits, cloud-based penetration tests, source code analysis, network penetration tests, cloud-based security/configuration reviews, mobile penetration tests, hardware assessments across multiple industries and environments. Create detailed penetration test reports in the English language (detailing the steps that were taken to exploit the issues and provide actionable remediation suggestions). Work with clients, participate in calls for scoping, kick-offs, and findings, to communicate the scope, status, results, and remediations, and support the smooth progress of the tests; escalate issues when needed. Create/script tools and exploits during the engagement to demonstrate a vulnerability with proof or write meaningful test cases (to test all attack theories). Take a hands-on approach to penetration testing. Very little automation is used (we take very deep dives into our targets to provide the best results). Work with other team members on client assessments. We are a team and work best as a group. It is very rare to have a solo engagement. Contribute to in-house written tools (Python) to aid in the penetration testing process. Experience and Qualifications Capable of performing in-depth penetration tests (including tests that are 2-3 week duration or even less) for Web Applications, Source Code Auditing, Cloud-based services, Network Penetration tests, Mobile Penetration Tests, among others. Strong problem-solving skills (technical and non-technical) are essential. High degree of autonomy in managing and solving tasks are expected, making sound decisions and prioritizing actions effectively to ensure deadlines and client objectives are met. Strong understanding of vulnerabilities and mitigation controls. Good attention to detail and ability to complete tasks by the deadline. Capable of focusing on clearly defined objectives when the client requires. Well organized and ability to work autonomously. Technical curiosity and self-starter. Capable of creative thinking to generate and test attack theories to detect vulnerabilities based on your understanding of the targets. Commitment to the cybersecurity discipline and willingness to support the rest of Appgate when needed. Willing to share knowledge with the team or act as a mentor in areas of strength and expertise (as the team will share knowledge with you). Qualifications Skills Behaviors Preferred Functional Expert Functional Expert: Considered a thought leader on a subject Dedicated Dedicated: Devoted to a task or purpose with loyalty or integrity Motivations Preferred Growth Opportunities Growth Opportunities: Inspired to perform well by the chance to take on more responsibility #J-18808-Ljbffr