Find On-site/Hybrid Jobs
Ethical Hacker (Cyber Security)

TECHNO VISTA DYNAMICS
Remote Cybersecurity Specialist

ALPHA DYNAMICS STUDIO
Microsoft Copilot Agents Developer

Empathy Technologies
Smarter Job Matches Await
Log in to discover AI-curated job opportunities tailored to your skills and goals.
Ethical Hacker (Cyber Security)

TECHNO VISTA DYNAMICS
Ethical Hacker (Cyber Security)
TECHNO VISTA DYNAMICS
Remote Details
Open Country:Worldwide
Language Requirements:English
Job Description
- Employee Recognition and Rewards
Community Service, No Politics at Work, Performance Bonus
- Insurance Health & Wellness
Life Insurance
- Perks Benefits
Pay in Crypto
Description
Techno Vista Dynamics is on a mission to proactively defend digital assets by identifying security flaws before attackers do. As an Ethical Hacker, you will simulate real-world cyberattacks, exploit vulnerabilities, and work with teams to enhance security resilience. If you thrive in offensive security, red teaming, and penetration testing, this role is for you!
- Simulate Advanced Attacks – Execute penetration testing, exploit vulnerabilities, and conduct adversary emulation on networks, applications, and cloud environments.
- Hunt for Hidden Threats – Perform deep security research, uncover zero-day vulnerabilities, and continuously test the resilience of our systems.
- Develop Custom Exploits & Tools – Create custom scripts, payloads, and attack methodologies to bypass security controls and improve testing efficiency.
- Analyze & Report Exploitability – Document findings with technical & executive-level reports, providing detailed remediation plans to mitigate risks.
- Strengthen Cyber Defenses – Work closely with blue teams, developers, and security engineers to implement countermeasures and improve overall security posture.
- Monitor Emerging Cyber Threats – Stay ahead of the latest attack vectors, hacking techniques, and TTPs (Tactics, Techniques, and Procedures) used by real-world adversaries.
Requirements
- Hands-on expertise in penetration testing for web applications, networks, APIs, and cloud environments.
- Deep understanding of attack methodologies (privilege escalation, lateral movement, social engineering, etc.).
- Proficiency with exploitation frameworks (Metasploit, Cobalt Strike, Empire, etc.) and custom exploit development.
- Strong knowledge of security misconfigurations, encryption flaws, and post-exploitation techniques.
- Advanced experience with security tools (Burp Suite, Nmap, Wireshark, Gobuster, Hydra, SQLmap).
- Proficiency in scripting & automation (Python, Bash, PowerShell) for security assessments.
- Familiarity with MITRE ATT&CK framework, OWASP Top 10, NIST security guidelines.
- Security certifications (OSCP, CRTP, CEH, GPEN, CISSP) are a plus but not required.

Yosep Martin
Petugas HRTECHNO VISTA DYNAMICS
High response rate