MNCHR MNCHR Jobs
← Back

Group Specialist - Penetration Testing

Company: dpworld

Location: Bangalore, Karnataka, India

Source: oracle

Language: english


<figure class="table"><table style="border-collapse:collapse;border:none;" border="1" cellspacing="0" cellpadding="0" width="655"><tbody><tr><td style="background-color:#B3B3B3;border:solid windowtext 1.0pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><h3 style="margin:6.0pt 0cm;"><span style="color:black;font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>KEY ACCOUNTABILITIES</strong></span></span></h3></td></tr><tr style="height:40.0pt;"><td style="border-top:none;border:solid windowtext 1.0pt;height:40.0pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><p style="text-align:justify;">&nbsp;</p><ul style="list-style-type:disc;padding-left:29.73px;"><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">The ideal candidate should bring a balanced background across application security testing and infrastructure penetration testing, combined with the ability to write scripts, build tooling, automate test cases, analyze code/configurations, and integrate AI-enabled security tools into the testing lifecycle. The role requires close collaboration with engineering, infrastructure, cloud, SOC, architecture, and product teams to validate security posture, identify exploitable weaknesses, and drive remediation.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Modern testing workflows increasingly include AI-assisted capabilities. For example, PortSwigger documents Burp AI as a way to improve testing efficiency, understand complex technologies, and streamline authentication setup, while still keeping the tester in control. Microsoft also publishes current guidance for both penetration testing in Azure and LLM red teaming, which reflects the growing expectation that offensive security teams can test both traditional systems and AI-enabled systems.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Assist BUs in conducting access control reviews of their applications &amp; systems</span></span></p></li></ul><h2><span lang="EN-GB">Application Penetration Testing</span></h2><ul style="list-style-type:disc;padding-left:29.73px;"><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Perform hands-on penetration testing of <strong>web applications, APIs, mobile backends, middleware, and custom business applications</strong>.&nbsp;</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Assess applications for vulnerabilities such as:&nbsp;</span></span></p><ul style="list-style-type:circle;"><li style="margin-bottom:6.0pt;"><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Broken access control / BOLA&nbsp;</span></span></p></li><li style="margin-bottom:6.0pt;"><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Authentication and session management flaws&nbsp;</span></span></p></li><li style="margin-bottom:6.0pt;"><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Injection vulnerabilities&nbsp;</span></span></p></li><li style="margin-bottom:6.0pt;"><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Server-side request forgery (SSRF)&nbsp;</span></span></p></li><li style="margin-bottom:6.0pt;"><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Business logic abuse&nbsp;</span></span></p></li><li style="margin-bottom:6.0pt;"><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Client-side security weaknesses&nbsp;</span></span></p></li><li style="margin-bottom:6.0pt;"><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Insecure deserialization&nbsp;</span></span></p></li><li style="margin-bottom:6.0pt;"><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Misconfigurations and secrets exposure &nbsp;</span></span></p></li></ul></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Conduct authenticated and unauthenticated assessments across internet-facing and internal applications.&nbsp;</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Test REST, SOAP, GraphQL, and modern API architectures.&nbsp;</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Review application architecture, trust boundaries, and data flows to identify realistic attack paths.&nbsp;</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Validate remediation fixes and perform re-testing.</span></span></p></li><li style="tab-stops:list 36.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Perform infrastructure penetration testing across:&nbsp;</span></span><ul style="list-style-type:circle;"><li style="tab-stops:list 72.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Internal and external networks&nbsp;</span></span></li><li style="tab-stops:list 72.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Active Directory / Windows environments&nbsp;</span></span></li><li style="tab-stops:list 72.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Linux and Unix servers&nbsp;</span></span></li><li style="tab-stops:list 72.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Network devices and segmentation controls&nbsp;</span></span></li><li style="tab-stops:list 72.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">VPN, remote access, and identity-connected infrastructure&nbsp;</span></span></li><li style="tab-stops:list 72.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Cloud environments and hybrid infrastructure&nbsp;</span></span></li></ul></li><li style="tab-stops:list 36.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Assess privilege escalation paths, lateral movement opportunities, credential exposure, trust abuses, and weak administrative controls.&nbsp;</span></span></li><li style="tab-stops:list 36.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Conduct attack path testing across enterprise environments to identify high-risk chaining opportunities.&nbsp;</span></span></li><li style="tab-stops:list 36.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Evaluate resilience of endpoint, network, identity, and server controls against real-world attack techniques.</span></span></li></ul><p><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Evaluate and integrate modern AI-enabled testing capabilities into the pentesting workflow, such as:</span></span></p><ul style="list-style-type:disc;"><li style="tab-stops:list 36.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">AI-assisted web testing and workflow understanding&nbsp;</span></span></li><li style="tab-stops:list 36.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">AI-enhanced reporting/documentation&nbsp;</span></span></li><li style="tab-stops:list 36.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">AI-supported attack-path reasoning&nbsp;</span></span></li><li style="tab-stops:list 36.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">AI-assisted code and configuration review&nbsp;</span></span></li><li style="tab-stops:list 36.0pt;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">AI red teaming for LLM- or agent-based applications where relevnt</span></span></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Always act as an ambassador for DP World when working; promoting and demonstrating positive behaviours in harmony with DP World’s Principles, values and culture; ensuring the highest level of safety is applied in all activities; understanding and following DP World’s Code of Conduct and Ethics policies</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Perform other related duties as assigned&nbsp;</span></span></p></li></ul></td></tr></tbody></table></figure><figure class="table"><table style="border-collapse:collapse;border:none;" border="1" cellspacing="0" cellpadding="0" width="655"><tbody><tr style="height:11.7pt;"><td style="background-color:#B3B3B3;border:solid windowtext 1.0pt;height:11.7pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><p class="Tablehead" style="margin:3.0pt 0cm;text-align:left;" align="left"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>QUALIFICATIONS, EXPERIENCE AND SKILLS</strong></span></span></p></td></tr><tr style="height:15.75pt;"><td style="border-top:none;border:solid windowtext 1.0pt;height:15.75pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><p style="margin-left:0cm;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>Knowledge and Experience</strong></span></span></p><ul style="list-style-type:disc;padding-left:29.73px;"><li><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Bachelor’s Degree in Computer Science or equivalent</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Should have 10-12 years of experience in application and infra pen testing.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Good understanding in E-commerce, logistics, supply chain &amp; port operations applications will be an added advantage</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience in establishing cyber &amp; third-party risk management processes</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Working knowledge of ISO 27001, COBIT 2019 etc.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience in working with Multinational Companies (MNC) is preferable</span></span></p></li></ul><p style="margin-left:0cm;">&nbsp;</p><p style="margin-left:0cm;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>Soft Skills</strong></span></span></p><ul style="list-style-type:disc;padding-left:24px;"><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Excellent communication &amp; analytical skills</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Program and Project management skills</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Time management skills</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Team player and conflict management skills</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Coaching / guiding skills</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Ability to adapt in a complex environment, loves challenges, with the will and drive to learn new things on his/her own</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Cultural awareness</span></span></li></ul><p style="margin-left:0cm;">&nbsp;</p><p style="margin-left:0cm;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>Technical Skills</strong></span></span></p><ul style="list-style-type:disc;padding-left:24px;"><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Strong hands-on experience in <strong>application penetration testing</strong> and <strong>infrastructure penetration testing</strong>.&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Strong knowledge of:&nbsp;</span></span><ul style="list-style-type:circle;padding-left:48px;"><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Web security testing&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">API security testing&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Network and server exploitation fundamentals&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Active Directory attack techniques&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Windows and Linux internals&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Authentication, identity, and privilege escalation paths&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Cloud security fundamentals&nbsp;</span></span></li></ul></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Strong hands-on experience with tools such as:&nbsp;</span></span><ul style="list-style-type:circle;padding-left:48px;"><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Burp Suite&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Nmap&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Metasploit &nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">BloodHound &nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Responder / Impacket&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Nessus / Qualys&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Wireshark &nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Custom scripts and offensive security frameworks&nbsp;</span></span></li></ul></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Strong programming / scripting skills in <strong>Python, PowerShell, Bash, JavaScript, or Go</strong>.&nbsp;</span></span></li><li><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Ability to develop or modify tools, proof-of-concepts, payloads, and automation scripts.&nbsp;</span></span></li></ul><p style="margin-left:0cm;"><span style="font-family:&quot;Tahoma&quot;,sans-serif;"><span style="font-size:10.0pt;">Understanding of secure coding concepts and ability to review code snippets for security issues.</span></span></p><p>&nbsp;</p></td></tr></tbody></table></figure><p>&nbsp;</p><p>#LI-AA6</p>
🔥 Apply Now
Home | About | Contact | Privacy Policy | Disclaimer