Join Our Team! Job Opportunities Explore our latest openings and take the next step in your career with us. Job Openings Cybersecurity Analyst Cybersecurity Analyst Responsibilities Conduct security assessments of systems, applications, and infrastructure to identify vulnerabilities and potential risks. Perform penetration testing to identify and address security weaknesses. Develop attack scenarios, perform tests, and compile reports with findings and recommendations for improvement. Collaborate with cross-functional teams, such as developers and project managers, to enhance security practices and protocols. Stay informed about emerging security threats and vulnerabilities, and advise on necessary preventative measures. Create reusable security policies and scripts for team usage. Provide mentorship to junior team members on cybersecurity best practices. Qualification Proven experience in conducting security assessments and penetration testing on web applications, software, networks, or infrastructure. Expertise with security frameworks such as OWASP and a strong understanding of common attack vectors and methodologies. Proficiency in penetration and exploitation tools, such as Metasploit, Nmap, or Burp Suite. Strong skills in programming or scripting for developing and automating attack tools and scripts. Knowledge of cloud security configurations (e.g., AWS, Azure, or Google Cloud). Proficiency in creating reports on security findings, including remediation recommendations. Experience with APIs and creating secure Rest APIs is a plus. Familiarity with encryption standards, data protection, and compliance regulations (e.g., GDPR). Penetration Tester Responsibilities: Conduct penetration tests on networks, web/mobile applications, and IT systems. Analyze and report security testing results, providing clear recommendations to stakeholders. Collaborate with cross-functional teams to improve security frameworks and reduce risks. Perform ethical exploitation of vulnerabilities to assess their impact. Requirements: Proficient in penetration testing methodologies, tools, and frameworks (e.g., Metasploit, Burp Suite, Nmap). Strong understanding of common vulnerabilities (SQL injection, XSS, CSRF) and their ethical exploitation and mitigation. Proficiency in databases (MySQL, PostgreSQL) and scripting languages (PHP, Python, Bash). Knowledge of network security concepts such as intrusion detection, malware analysis, and access management. Hands-on experience with Windows, Linux, and Unix operating systems. Preferably certified in OSCP, CEH, or GPEN, with practical experience in ethical penetration testing.