ResponsibilitiesDevelop approaches to identify vulnerabilities and understand impact surfacePerform penetration tests on web applications, network devices, and cloud infrastructuresPinpoint methods and entry points that attackers may use to exploit vulnerabilities or weaknessesSearch for weaknesses in common software, web applications and proprietary systemsResearch, evaluate, document and discuss findings along with recommendation to fix and/or mitigate the vulnerabilitiesReview and provide feedback for information security fixesEstablish improvements for existing security services, including hardware, software, policies and proceduresIdentify areas where improvement is needed in security education and awareness for usersBe sensitive to corporate considerations when performing testing (i.e. minimise downtime and loss of employee productivity)Stay updated on the latest malware and security threatsCommunicate findings to both technical staff and executive leadershipSkillsShould have attackers mindset and coding skill required to infiltrate systemsResearch inclination to go deeper and develop custom exploitation approachesComprehensive knowledge of web security(OWASP and more), including forensics, systems analysis and moreInsight into how hackers exploit the human element to gain unauthorised access to secure systemsClear understanding of how computer security breaches can disrupt business, including the financial and managerial implicationsExceptional problem-solving skillsCommunications skills to document and share your findings(preferred) certification in Cyber security or bug bounty experience(preferred) Understanding of CIS, NIST and other cyber security frameworks(preferred) exposure to open-source tools for vulnerability assessment (Nmap, SqlMap, Zap etc.) exposure to authorization systems