Home
Jobs

Penetration Tester

0 years

0 Lacs

Posted:2 days ago| Platform: Linkedin logo

Apply

Work Mode

Remote

Job Type

Contractual

Job Description

Company Description

Neo Prism Solutions LLC is dedicated to providing sophisticated IT and business solutions with a proactive, reliable, innovative, and sustainable approach. We focus on Business Intelligence & Data Warehousing, Database Management Systems, Application Packaging, and Virtualization. Our services are designed to meet evolving client needs, streamlining data processes and optimizing software deployment to enhance agility and scalability. Our commitment to excellence fosters a corporate culture prioritizing professional growth, making us a trusted partner in driving sustained success and innovation for our valued clients.


Role Description

This is a contract remote role for a Penetration Tester. The Penetration Tester will be responsible for identifying and addressing security vulnerabilities in client systems through reverse engineering, application security assessments, red teaming, and malware analysis. The candidate will work collaboratively with client teams to proactively improve cybersecurity measures and ensure infrastructure robustness.


2. Objectives

The primary goals of the penetration test are to:

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Assess the security of _____________ from an external attacker's perspective.

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Identify vulnerabilities, misconfigurations, and security weaknesses.

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Evaluate the effectiveness of current security controls.

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Provide actionable recommendations to mitigate identified risks.

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Support compliance efforts related to information security standards (e.g., OWASP Top 10, ISO 27001, PCI-DSS, etc.).

3. Scope of Engagement

3.1 In-Scope Assets

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Associated subdomains (if provided or discoverable)

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Publicly accessible APIs tied to the above domain

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Web-based interfaces accessible without internal network access

3.2 Out-of-Scope

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Internal corporate systems not accessible through the public domain

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Third-party services or integrations unless explicitly authorized

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) testing

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Social engineering (e.g., phishing, vishing) unless separately authorized

4. Testing Methodology

Testing will follow industry-standard methodologies, including but not limited to:

4.1 Reconnaissance

Ā·Ā Ā Ā Ā Ā Ā Ā Ā DNS enumeration and subdomain discovery

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Service fingerprinting and banner grabbing

Ā·Ā Ā Ā Ā Ā Ā Ā Ā OSINT (Open Source Intelligence) gathering

4.2 Vulnerability Assessment

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Automated scanning to identify common CVEs and misconfigurations

Ā·Ā Ā Ā Ā Ā Ā Ā Ā Manual verification of high-risk vulnerabilities

4.3 Exploitation (Non-destructive)

•       Safe exploitation techniques to validate risk

•       No disruption or data exfiltration unless explicitly authorized

4.4 Post-Exploitation & Privilege Escalation

•       Identify lateral movement opportunities within the web application

•       Session hijacking, privilege escalation, and impersonation checks

4.5 OWASP Top 10 Coverage

Testing will include, but is not limited to:

•       Injection flaws (e.g., SQL, NoSQL, OS)

•       Broken authentication/session management

•       Sensitive data exposure

•       XML External Entities (XXE)

•       Broken access controls

•       Security misconfigurations

•       Cross-Site Scripting (XSS)

•       Insecure deserialization

•       Insufficient logging and monitoring

)

5. Deliverables

Upon completion of the engagement, the following deliverables will be provided:

5.1 Executive Summary

•       High-level overview for business stakeholders

•       Risk ratings and business impact of findings

5.2 Technical Report

•       Detailed list of identified vulnerabilities

•       Screenshots, payloads, and technical evidence

•       CVSS scores and risk rankings

•       Affected assets and reproduction steps

5.3 Remediation Recommendations

•       Detailed mitigation and remediation guidance

•       Prioritized recommendations based on risk and impact

5.4 Re-Test Report (Optional)

•       Confirmation of remediation actions (if included in scope)

6. Timeline

Activity Duration

Planning & Access SetupĀ Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā 1-2 business days

Testing PhaseĀ Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā 5 business days

Reporting & ReviewĀ Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā 5 business days

Optional Re-testĀ Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā Ā As agreed upon

7. Roles and Responsibilities

Client Responsibilities

•       Provide written authorization for testing

•       Make available any credentials or API keys (for gray/white-box testing)

•       Identify business hours and blackout periods

•       Coordinate with internal stakeholders

Testing Team Responsibilities

•       Conduct tests within agreed scope and timeframes

•       Minimize impact to production systems

•       Maintain confidentiality of all data accessed during testing

•       Report findings promptly if critical/high-risk vulnerabilities are discovered

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You

Chennai, Tamil Nadu, India

Kolkata, Gurugram, Bengaluru