PbRole Summary /b /ppbr/ppAt Ackcent Cybersecurity, we share a common goal: protecting our customers' assets from cyber threats through high-quality service and transparent communication. /ppWe are looking for a professional who is not only a skilled pentester but also has a strong programming background. In this role, you will work within our Red Team (RT), specializing in Web Security Audits and SAST (Static Application Security Testing). You will be responsible for identifying vulnerabilities from the outside-in (Pentesting) and the inside-out (Code Analysis), helping our clients build more resilient applications. /ppbr/ppbResponsibilities /b /ppbr/pp· Web Infrastructure Pentesting: Perform high-quality security audits, penetration tests, and vulnerability assessments on web applications and environments. /pp· SAST Code Review: Execute Static Application Security Testing (SAST) to identify logical and security flaws within the source code. (If you aren't an expert in specific SAST tools yet, we will provide the training, but a strong ability to read and understand code is essential). /pp· Technical Documentation: Create clear deliverables and \"attack paths.\" You must be able to present findings and security recommendations effectively to both technical teams and stakeholders. /pp· Tool Development: Propose and develop internal scripts or tools to improve the team’s auditing efficiency and automation. /pp· Client Collaboration: Act as a technical bridge, ensuring the quality of the service and responding to client requirements with a focus on problem-solving. /ppbr/ppbQualifications /b /ppbr/ppbMinimum qualifications /b /ppbr/pp· Experience: 2+ years of experience in Web Pentesting or Red Team environments. /pp· Programming Skills: Proficiency in reading and understanding code (e.g., Python, JavaScript, Java, .NET, or PHP). You should feel comfortable auditing logic within a codebase. /pp· Technical Expertise: Understanding and knowledge of OWASP methodology. /pp· Proven experience identifying and exploiting web application vulnerabilities. /pp· Knowledge of Linux/Windows OS and network fundamentals. /pp· Languages: English fluency (B2 level or higher). /pp· Soft Skills: Ability to explain complex technical concepts to non-technical people (humility is key). /ppbr/ppbIdeal qualifications /b /ppbr/pp· Certifications: OSCP, eWPTX, OSWE, CRTO... /pp· SAST Experience: Familiarity with tools like Checkmarx, Fortify, SonarQube, or Snyk. /pp· Education: Degree in Computer Science, Telecommunications, or equivalent experience/self-taught background. /ppbr/ppbWho you are /b /ppbr/ppWe value humility and a collaborative spirit. We are looking for someone who isn't afraid to ask \"why\" or \"how,\" who stays current with ethical hacking best practices, and who enjoys working in a highly collaborative environment. If you love breaking things but are even more passionate about understanding how they are built, we want to meet you. /p