logo inner

Penetration Testing Engineer - Application Security

This job is no longer open

Description


The Penetration Testing Engineer – Application Security is a mid-level role for a tester who has grown beyond the basics and can independently execute penetration tests within a primary domain of expertise. Engineers are offensive security subject matter experts – conducting full assessments with minimal supervision, contributing to methodology improvements, and acting as a point of contact for clients during engagements. By this stage, they are capable of scoping and planning a test in their domain, executing tests, and producing and communicating detailed reports with practical remediation advice.

Mid-level testers act as the technical client focal within engagements, leading technical execution for assigned projects.

Requirements


Typical Experience: ~3–5 years of penetration testing experience, during which they have performed numerous assessments. At this point, they have a track record of completed pen tests and proven competencies.

Domain Expertise:

Mastery in at least one penetration testing domain. For example, an engineer might be an expert in Web Application Security – adept with advanced web vulnerabilities (beyond OWASP Top 10, including logic flaws, deserialization, etc.), skilled in using Burp Suite for complex testing, and possibly familiar with secure code review.

Technical Skills:

Strong practical skills and tool usage. Mid-level testers are comfortable with a variety of pen testing tools and techniques. This includes network scanners (Nmap, Nessus), exploitation frameworks (Metasploit, Cobalt Strike), web testing suites (Burp Suite, OWASP ZAP), and scripting/programming to automate tasks or develop custom exploits (common languages include Python, PowerShell, or Bash). Understanding manual testing techniques – for example, crafting customized payloads, bypassing filters, or chaining vulnerabilities. An engineer at this level is often responsible for ensuring the accuracy of findings (minimal false positives) and may contribute new findings to the team’s knowledge base.

Soft Skills:

Solid communication and consulting skills. By now, the engineer can write thorough technical reports that require only light review, translating technical findings into clear, actionable recommendations. They are also responsive and growing in client-facing abilities, able to lead client briefing calls, deliver vulnerability walkthroughs, and handle questions from stakeholders. Their time management and project coordination skills have improved, enabling them to handle multiple projects or deadlines.

Certifications (Optional):

Many mid-levels pen testers obtain well-regarded certifications as a by-product of developing their skills. Examples include OSCP, GWAPT (Web Application Testing), GPEN (Network Penetration), OSWE (Web Exploit Developer), etc. These certifications reinforce their domain expertise, but hands-on experience and successful engagements remain the primary proof of competency.

Expertise that aligns to our approach:


  • Bring 3+ years of hands-on experience in web application penetration testing, with a strong understanding of the OWASP WSTG methodology.
  • Apply structured testing techniques to assess authentication, session management, access control, input validation, error handling, and business logic.
  • Use tools like Burp Suite Pro, OWASP ZAP, Postman, and custom scripts to execute and document each step of the WSTG.
  • Demonstrate proficiency in manual testing and exploit development, including crafted payloads for XSS, SQLi, SSRF, IDOR, CSRF, and more.
  • Understand and test authentication mechanisms, including OAuth, SAML, MFA implementations, and JWT.
  • Perform access control testing across roles and privilege boundaries (WSTG-ATHZ), identifying vertical and horizontal privilege escalation opportunities.
  • Validate input validation and output encoding to uncover XSS, command injection, and template injection flaws.
  • Assess session management implementations for issues like weak session ID entropy, insecure cookie flags, or token replay (WSTG-SESS).
  • Execute client-side testing using browser dev tools and proxy-based inspection, evaluating DOM-based vulnerabilities and insecure local storage (WSTG-CLNT).
  • Understand API-specific attack surfaces, including REST and GraphQL, and test them using a combination of dynamic and manual methods.
  • Be comfortable with code-assisted testing (grey-box) when source is available, identifying logic flaws and insecure configurations.
  • Leverage scripting skills (Python, Bash, or JavaScript) to automate recon, fuzzing, or proof-of-concept exploit delivery.
  • Test across various environments (cloud-hosted, containerized, monolithic) and understand platform-specific nuances.
  • Maintain a deep curiosity and adherence to a methodical process, following the OWASP WSTG as a foundational guide.
  • Communicate findings clearly, with a strong emphasis on business impact, reproducibility, and strategic remediation.

Benefits


About Evolve Security 


Evolve Security is a next generation cybersecurity services firm headquartered in Chicago, IL powered by the Darwin Attack® Platform. We are dedicated to improving our client’s security posture by providing Attack Surface Management (ASM), Vulnerability Management as a Service (VMaaS), Continuous Penetration Testing (CPT) and cyber advisory. In addition to our professional cybersecurity service offerings, Evolve Security offers a cybersecurity bootcamp, “Evolve Academy”, currently ranked the #1 cybersecurity bootcamp in the world.

The Cybersecurity Bootcamp in Chicago provides immersive training, giving students the concrete and practical skills, needed on the job. Students gain real work experience through live security assessment work that they perform on not-for-profit companies.  We are passionate about directly improving our customers’ security posture, and we proudly train others to help meet the need for qualified cybersecurity talent.  

Why Join Evolve Security? 


  • Progressive, startup-like culture in a high-growth segment—minimal bureaucracy, rapid impact. 
  • Engage in a fast-paced and challenging environment with opportunity to grow your talents.

  • Immersive cybersecurity and technical training through Evolve Security Academy. 

  • Competitive compensation, healthcare, 401(k) match, and flexible paid time off. 

  • Hybrid/remote work with annual vacation reimbursement and parental leave. 

  • Engaged leadership.

This job is no longer open

Life at Evolve Security

Evolve Security is a technical cybersecurity services firm dedicated to improving your security posture where you are most vulnerable. Web applications, networks and people are most susceptible to cyber-attacks. Evolve Security is focused on working alongside and educating your current security, DevOps and IT staff on how to assess, test and resolve your security vulnerabilities throughout the full security lifecycle. In addition to our professional cybersecurity service offerings, Evolve Security offers a cybersecurity bootcamp, “Evolve Security Academy”, currently ranked the #1 cybersecurity bootcamp in the world by Switchup. Evolve Security Academy provides in-person and remote, immersive training, giving students the concrete and practical skills they will need on the job. Students gain real work experience through the live security assessment work they perform on non-profit organizations. We are passionate about directly improving our customers’ security posture, and we proudly train others to launch cybersecurity careers and close the cybersecurity talent gap.
Thrive Here & What We Value1. Progressive Startup Culture in a High Growth Organization2. FastPaced and Challenging Environment with Opportunity to Grow Talents3. Engage in Directly Improving Customers’ Security Posture4. Dedicated to Improving Client's Security Posture5. Passionate about Training Others to Help Meet the Need for Qualified Cybersecurity Talent
Your tracker settings

We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to measure ad campaign effectiveness, target ads and analyze site traffic. To learn more about these methods, including how to disable them, view our Cookie Policy or Privacy Policy.

By tapping `Accept`, you consent to the use of these methods by us and third parties. You can always change your tracker preferences by visiting our Cookie Policy.

logo innerThatStartupJob
Discover the best startup and their job positions, all in one place.
Copyright © 2025