About Company
Career.zycto is a dynamic force in cybersecurity, dedicated to protecting digital infrastructures worldwide. For an ethical hacking consultant, this means a unique opportunity to apply cutting-edge techniques against real-world threats. We foster a culture of continuous learning and empower our experts to push boundaries, developing innovative solutions that truly make a difference. Join a team where your expertise is not just valued, but essential in our mission to secure the future. Your insights will directly shape our clients’ resilience.
Advertisement
Job Description
Are you a relentless problem-solver with an unyielding passion for digital security? Do you thrive on the intellectual challenge of identifying vulnerabilities before malicious actors can exploit them? Career.zycto is seeking a highly skilled and motivated Ethical Hacking Consultant to join our growing team in Hellersdorf, Berlin. This is an unparalleled opportunity to leverage your expertise in penetration testing, vulnerability assessment, and security architecture review to safeguard critical systems and data for a diverse portfolio of clients across various industries, from finance to manufacturing and technology.
As an Ethical Hacking Consultant, you will play a pivotal role in our proactive defense strategy, acting as an essential layer of protection for our clients. You’ll be tasked with simulating sophisticated cyberattacks, employing advanced techniques to expose weaknesses across networks, web applications, mobile platforms, cloud environments, and internal infrastructure. Your responsibilities will extend beyond mere identification; you will provide comprehensive, detailed reports outlining discovered vulnerabilities, their potential impact, and critically, actionable recommendations for remediation. You will be instrumental in educating clients on best practices, developing robust mitigation strategies, and contributing to the overall maturity of their security frameworks through expert advice and strategic guidance. We believe in empowering our consultants with access to the latest tools, technologies, and continuous training, ensuring you remain at the absolute forefront of the ever-evolving threat landscape.
This dynamic role demands a meticulous eye for detail, a deep understanding of offensive security techniques, and the unique ability to think like an adversary while acting as a trusted, ethical advisor. You will collaborate closely with cross-functional teams, including incident response, security operations, and software development, to integrate security considerations into every stage of the system development lifecycle. Our work environment fosters innovation and continuous improvement, encouraging our consultants to explore new methodologies and contribute to our internal knowledge base. If you are passionate about cybersecurity, possess an insatiable curiosity, and are eager to make a tangible, significant impact on the digital world, Career.zycto offers a stimulating environment where your skills will be continually sharpened, your professional growth prioritized, and your contributions highly valued. Join us in shaping a more secure digital future for businesses globally.
Advertisement
Key Responsibilities
- Conduct comprehensive penetration tests (network, web application, mobile, cloud) for diverse clients.
- Perform in-depth vulnerability assessments and provide detailed, actionable reports.
- Develop and execute exploit code for proof-of-concept to demonstrate security weaknesses.
- Advise clients on security best practices, risk mitigation strategies, and remediation steps.
- Stay continuously updated with the latest attack vectors, security vulnerabilities, and industry trends.
- Contribute to internal security awareness training programs and knowledge sharing.
- Collaborate with internal teams on security architecture design reviews and threat modeling.
- Document findings, recommendations, and methodologies clearly and concisely for technical and non-technical audiences.
Required Skills
- 4+ years of professional experience in ethical hacking, penetration testing, or offensive security.
- Proficiency with industry-standard penetration testing tools (e.g., Metasploit, Burp Suite, Nmap, Wireshark, Nessus).
- Strong understanding of network protocols (TCP/IP), web technologies (HTTP/S, APIs), and various operating systems (Linux, Windows).
- Experience with scripting languages for automation and exploit development (e.g., Python, PowerShell, Bash, Ruby).
- In-depth knowledge of common security vulnerabilities, attack vectors, and frameworks (e.g., OWASP Top 10, CWE).
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills in English, capable of conveying complex technical information clearly.
Preferred Qualifications
- Relevant industry certifications such as OSCP, OSWE, OSEP, CEH, GPEN, GWAPT, GCSA.
- Experience with cloud security assessments across major providers (AWS, Azure, GCP).
- Knowledge of secure coding principles and secure software development lifecycle (SSDLC).
- Prior experience working in a cybersecurity consulting environment.
- German language skills are a significant plus.
- Bachelor's or Master's degree in Computer Science, Cybersecurity, Information Security, or a related technical field.
Perks & Benefits
- Highly competitive salary package and performance-based bonuses.
- Comprehensive health, dental, and vision insurance plans.
- Generous paid time off, including vacation, sick leave, and public holidays.
- Dedicated professional development budget for certifications, training courses, and industry conferences.
- Access to a state-of-the-art security lab and cutting-edge tools.
- A collaborative, innovative, and intellectually stimulating work environment.
- Clear pathways for career growth and advancement within the company.
- Commuter benefits and subsidies for public transport.
- Regular company-sponsored social events and team-building activities.
How to Apply
Interested candidates are encouraged to apply by clicking the link below. Please submit your resume and a cover letter detailing your relevant experience and why you are passionate about ethical hacking.
