Find On-site/Hybrid Jobs

Where
Location
Search
Relevance
Information Technology
Salary
Job Type
Benefits
More filters
Where
Location
Search
Filter
Relevance
Information Technology
Salary
Job Type
Benefits
More filters

Ethical Hacker (Cyber Security)

$1.4-1.8K[Monthly]
TECHNO VISTA DYNAMICS
Remote<1 Yr ExpBachelorFull-time

Remote Cybersecurity Specialist

$2-4K[Monthly]
ALPHA DYNAMICS STUDIO
Remote<1 Yr ExpBachelorFull-time

Smarter Job Matches Await

Log in to discover AI-curated job opportunities tailored to your skills and goals.

Find Your Dream Job Now

Ethical Hacker (Cyber Security)

$1.4-1.8K[Monthly]
TECHNO VISTA DYNAMICS
Remote<1 Yr ExpBachelorFull-time

Ethical Hacker (Cyber Security)

TECHNO VISTA DYNAMICS

$1.4-1.8K[Monthly]
Remote<1 Yr ExpBachelorFull-time
Chat & Apply

Remote Details

Open CountryWorldwide

Language RequirementsEnglish

Job Description

Benefits
  • Employee Recognition and Rewards

    Community Service, No Politics at Work, Performance Bonus

  • Insurance Health & Wellness

    Life Insurance

  • Perks Benefits

    Pay in Crypto

Description

Techno Vista Dynamics is on a mission to proactively defend digital assets by identifying security flaws before attackers do. As an Ethical Hacker, you will simulate real-world cyberattacks, exploit vulnerabilities, and work with teams to enhance security resilience. If you thrive in offensive security, red teaming, and penetration testing, this role is for you!


  • Simulate Advanced Attacks – Execute penetration testing, exploit vulnerabilities, and conduct adversary emulation on networks, applications, and cloud environments.
  • Hunt for Hidden Threats – Perform deep security research, uncover zero-day vulnerabilities, and continuously test the resilience of our systems.
  • Develop Custom Exploits & Tools – Create custom scripts, payloads, and attack methodologies to bypass security controls and improve testing efficiency.
  • Analyze & Report Exploitability – Document findings with technical & executive-level reports, providing detailed remediation plans to mitigate risks.
  • Strengthen Cyber Defenses – Work closely with blue teams, developers, and security engineers to implement countermeasures and improve overall security posture.
  • Monitor Emerging Cyber Threats – Stay ahead of the latest attack vectors, hacking techniques, and TTPs (Tactics, Techniques, and Procedures) used by real-world adversaries.

Requirements

  • Hands-on expertise in penetration testing for web applications, networks, APIs, and cloud environments.
  • Deep understanding of attack methodologies (privilege escalation, lateral movement, social engineering, etc.).
  • Proficiency with exploitation frameworks (Metasploit, Cobalt Strike, Empire, etc.) and custom exploit development.
  • Strong knowledge of security misconfigurations, encryption flaws, and post-exploitation techniques.
  • Advanced experience with security tools (Burp Suite, Nmap, Wireshark, Gobuster, Hydra, SQLmap).
  • Proficiency in scripting & automation (Python, Bash, PowerShell) for security assessments.
  • Familiarity with MITRE ATT&CK framework, OWASP Top 10, NIST security guidelines.
  • Security certifications (OSCP, CRTP, CEH, GPEN, CISSP) are a plus but not required.
SQLMySQLLinuxWindowsJavaSoftware TestingFunctional TestingShellUnit Testing

Yosep Martin

Petugas HRTECHNO VISTA DYNAMICS

More than ten replies today

Chat
View more details