DESPRE COMPANIE

We are a young and dynamic security company with a global presence. We are developing https://Pentest-Tools.com – a cloud-based penetration testing platform that helps security and IT pros easily perform basic to advanced offensive security engagements using built-in tools and powerful, automated features. You should know that at pentest-tools.com your work matters and it is being used by thousands of companies every day. We value our team and we do our best to create a space where everyone can grow.

0-Day Research Intern
Stagiu plătit la Pentest-Tools.com · Începe după sesiune
Categorii:
  • – Cybersecurity
Oraș:
  • room București

Role overview

We are looking for an 0-day Research Intern who wants to take their skills to the next level and enjoy being part of a team of passionate engineers and security specialists.

You will have the opportunity to research and find 0-day vulnerabilities in the latest version of software solutions with a focus on web exploitation and over the wire exploits.

This role requires in-depth cybersecurity knowledge. The role will develop a deeper understanding of the latest vulnerabilities and attack techniques. Your work would involve finding 0-day vulnerabilities as well as helping our other technical teams with specialized exploitation knowledge and research of non-standard attack vectors.

We are looking for a long-term fit—someone we can invest in. Optionally, for those inclined, you can also contribute to our blog by writing technical articles about the interesting exploits that were identified.

Requirements

We expect you to have the following:

  • Have participated in CTFs, are active in Bug Bounty projects or have completed at least one hard/impossible (or equivalent) box on a CTF platform (e.g. HTB)
  • Knowledge on how to exploit common types of vulnerabilities (injection, remote code execution, local file inclusion, directory traversal, memory corruption, etc.)
  • A very good understanding of the HTTP protocol and how web applications work/break.

It is a plus if you also:

  • Have received one or more CVEs
  • Have responsibly disclosed vulnerabilities in a software
  • Have previous experience with hacking related personal projects.