Security Expert (Pentester)

Required work experience: 3–6 years
Full time, full day


  1. Strong knowledge of network technologies (addressing, routing, network devices, etc.), OS (Windows, Linux / Unix), DBMS.
  2. Understanding the principles of organizing IT infrastructure and providing information security in modern companies in the SMB and Enterprise segments.
  3. Fluency in the methods of conducting traditional network attacks, understanding their spectrum of exposure in various environments.
  4. Skills of working using the command line interface, development of scripts and scripts (cmd, bash, vb script, perl, etc.).
  5. Knowledge and skills of using regular expressions (regex).
  6. Strong knowledge and experience in one or several areas: software development (C #, web-technologies, NET, Perl, Go, etc.), analysis of software security (source code), reverse engineering, technical audit of information security.
  7. Fluency in existing tools for analyzing the security of information systems and software as part of modern distributions for analyzing security (BackTrack, NST, pentoo, Metasploit), preferably knowledge of commercial software products (CoreImpact, Immunity Canvas, Metasploit Express, SAINT).
  8. Skills in developing proprietary software for identifying a vulnerability or checking for its existence using one or more programming languages.
  9. Skills in developing security analysis tools, individual verification algorithms, writing exploiting software code (exploit), understanding existing operating methods.
  10. Experience in participating in hacking competitions for computer systems (CTF, etc.), in specialized conferences.
  11. Skills and experience in preparing analytical and reporting documents.
  12. Work experience of at least 3 years in the field of practical analysis of security.
  13. Confident knowledge and knowledge of technical English tongue.
  14. Higher (secondary special) technical education.
  15. Citizenship of Belarus.


  1. Availability of certificates in the field of IT / IS.
  2. Experience in detecting software gaps, their subsequent analysis and writing an exploit for them.
  3. Experience in writing thematic articles, software and methodological documentation on the subject of AS security analysis.
  4. Knowledge of the best existing foreign practices for conducting penetration tests and approaches to security analysis.
  5. The presence of our own scientific and technical backlog in this subject area, the desire to improve and the desire to develop career growth.



Scroll top