Carry out Red Team (offensive security) activities such as penetration testing, vulnerability assessments, exploitation, and red team simulations to proactively identify weaknesses in applications, infrastructure, and cloud environments.
Perform Blue Team (defensive security) tasks including continuous monitoring of systems and networks, analyzing alerts from SIEM/IDS/IPS/EDR, and leading security incident detection and response.
Develop and fine-tune detection rules, correlation logic, and automation scripts to improve proactive defense and reduce response time.
Research latest attack techniques, exploits, and defense mechanisms to stay ahead of evolving cyber threats.
Collaborate with cross-functional teams (SOC, DevOps, IT, Engineering) to embed security across the SDLC and infrastructure.
Document findings, prepare reports, and provide clear remediation guidance for both technical and non-technical stakeholders.
Apply strong knowledge of network routing and routing protocols (e.g., BGP, OSPF, EIGRP, RIP) in securing and troubleshooting network infrastructures.
Requirements
Min. Bachelor’s degree in Computer Science, Cybersecurity, or related field (or equivalent practical experience).
Min. 2 years of experience in cyber security, with exposure to both offensive and defensive practices.
Strong knowledge of penetration testing frameworks (Metasploit, Burp Suite, Kali Linux, Nmap, OWASP ZAP).
Hands-on experience with defensive tools: SIEM (Splunk, ELK, QRadar), IDS/IPS, EDR (CrowdStrike, SentinelOne), Firewalls, and WAF.
Solid understanding of security frameworks and methodologies (MITRE ATT&CK, OWASP Top 10, NIST, ISO 27001).
Proficiency in scripting or programming (Python, Bash, PowerShell, etc.) for automation and tool development.
Having Certified Ethical Hacker (CEH) Certification is a plus.
Job Types: Permanent & Contract
Benefits
Interesting basic salary.
Plus, other benefits and annual bonus depending on qualifications, experiences and performances.