Penetration Test / Red Team Engineer

4 - 8 years

0 Lacs

Posted:14 hours ago| Platform: Shine logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

As a Penetration Test / Red Team Engineer at Code Ethics Pvt. Ltd., your role involves evaluating penetration testing and red-teaming capabilities across the IoT product portfolio and enterprise environment. You will be responsible for planning and executing offensive security engagements to simulate real-world attackers against embedded/IoT systems and standard enterprise infrastructure. Your contributions will help define test scoping, deliver high-value findings, and collaborate with product and infrastructure teams to remediate risks. Key Responsibilities: - Plan and lead end-to-end penetration tests and red-team exercises for IoT devices, firmware, cloud backends, mobile apps, and enterprise networks. - Perform hardware & firmware analysis (JTAG, UART, SPI), protocol fuzzing, and exploit development on IoT devices. - Test cloud and backend services supporting IoT solutions, including APIs, authentication, and data stores. - Execute network, web application, and AD/identity compromise scenarios during enterprise assessments. - Conduct social engineering/phishing exercises as part of red-team scopes. - Develop custom tooling, proof-of-concept exploits, and automation to reproduce findings effectively. - Produce clear, actionable reports with risk-rated findings, reproduction steps, recommended mitigations, and remediation guidance. - Present findings to technical teams and executive stakeholders, supporting remediation verification and re-testing. - Contribute to building and improving internal red-team playbooks, test methodologies, and secure engineering guidance. - Ensure all engagements adhere to legal, ethical, and contractual rules of engagement. Qualifications & Experience Required: - 4+ years of hands-on experience in penetration testing, red teaming, or offensive security, with a focus on IoT/embedded systems and enterprise environments. - Strong practical skills in IoT firmware analysis, hardware interfacing, exploit development, web/API penetration testing, network exploitation, and Active Directory/identity compromise techniques. - Proven experience documenting tests, writing clear remediation reports, and familiarity with red-team frameworks and attack emulation. - Strong communication skills to explain technical risks to engineers and business stakeholders. Nice-to-have: - Certifications such as OSCP, OSCE, GPEN, CREST CRT, GIAC, or equivalent. - Experience with cloud IoT architectures and related threat vectors, custom exploit or fuzzing tooling, and open-source offensive tools. - Background in embedded development, electronics, or firmware engineering, and running purple-team engagements. In this role, your success will be measured by delivering thorough scoping documents, technical reports, executive summaries, reductions in repeat findings, and contributions to internal playbooks and security checklists. You will also ensure legal and compliance requirements are met for all engagements.,

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You