Network Penetration Testoer

Ethical Hacker / Network Penetration Tester

  • Part Time
  • Remote

We are seeking a highly skilled Ethical Hacker / Network Penetration Tester to join our cybersecurity team. The ideal candidate will possess hands-on experience in offensive security, vulnerability discovery, exploitation, and IT infrastructure testing. You will be responsible for simulating real-world attacks against enterprise networks, applications, and systems to identify weaknesses before malicious actors do.

Key Responsibilities

  • Conduct authorized penetration tests and security assessments on internal and external networks, wireless systems, cloud environments, web and mobile applications, APIs, and supporting infrastructure.

  • Plan, scope, and execute comprehensive vulnerability assessments using manual techniques and automated tooling.

  • Perform network discovery, exploitation, privilege escalation, pivoting, and post-exploitation activities, leveraging best-practice offensive frameworks.

  • Identify and exploit vulnerabilities in systems, applications, and services (e.g., misconfigurations, insecure controls, authentication flaws, and code-level issues).

  • Develop detailed, professional written reports outlining findings, risk impacts, exploit evidence, and prioritized remediation recommendations.

  • Work collaboratively with IT, engineering, and security operations teams to remediate vulnerabilities and verify fixes.

  • Assist in improving internal security processes, policies, testing methodologies, and frameworks.

  • Stay current on emerging threats, exploit techniques, offensive tooling, and defensive controls — sharing knowledge across the organization.

  • Support incident response activities when required by helping analyze intrusions or assist with forensic evidence.

  • Participate in red-team and adversary emulation engagements to validate organizational resiliency.

Required Qualifications

  • Minimum five years of professional experience in penetration testing or offensive security roles.

  • Deep understanding of TCP/IP networking, system architecture (Windows, Linux/Unix), and secure/ insecure protocols.

  • Strong knowledge of penetration testing methodologies (e.g., OWASP, PTES) and offensive tools such as Metasploit, Burp Suite, Nmap, Wireshark, etc.

  • Hands-on experience with vulnerability analysis, exploitation frameworks, scripting languages (Python, Bash, PowerShell), and real-world attack techniques.

  • Familiarity with cloud security concepts (AWS, Azure, GCP) and testing cloud-native resources.

  • Excellent technical writing and verbal communication skills with the ability to present complex findings to technical and non-technical stakeholders.

  • Strong problem-solving, analytical skills and a disciplined, ethical approach to security testing.

  • Ability to handle sensitive information with strict confidentiality and professionalism.

Preferred Qualifications

  • Industry certifications such as:

    • CEH (Certified Ethical Hacker)

    • OSCP / OSCE (Offensive Security Certified Professional/Expert)

    • GPEN, eCPPT, or similar offensive security accreditation.

  • Experience with advanced testing techniques — social engineering, phishing simulations, hardware hacking, or wireless exploitation.

  • Familiarity with secure DevOps and CI/CD environments.

  • Background in threat emulation, red-team operations, or adversary-simulation frameworks.

What We Offer

  • Competitive compensation and flexible work arrangements.

  • Access to advanced testing environments, security tooling, and ongoing training.

  • Opportunities for professional growth into senior cyber-security and leadership roles.

  • Collaborative culture with experienced security professionals dedicated to protecting critical assets.

  • Exposure to diverse client systems and high-impact engagements.

How to Apply

Please send the following:

  • Resume or CV detailing relevant penetration testing experience.

  • Copies of relevant certifications or training records.

  • Optional: A brief portfolio of past assessments (sanitized, non-confidential).

This is needed for our background check
Maximum file size: 8 MB.
Maximum file size: 8 MB.
Maximum file size: 8 MB.
Maximum file size: 8 MB.
Upload your CV/resume
Non-relatives only

Technical Security. 
Tactical Expertise. 
Total Confidence.

NYS Watch, Guard or Patrol Agency 11000201106

NYS Security Installer 12000332886

Our Address

1 Liberty Plaza
23rd Floor
New York, NY 10006

Contact Us

+1 (646) 558-0051
info@klcsecurity.com

Sensitive

This permission level provides access to sensitive content that is restricted to individuals whose identities have been formally verified by our organization. The materials available under this access level may include confidential, proprietary, or otherwise sensitive information that is not intended for public or general user access. Any unauthorized disclosure, sharing, or misuse of this content may result in immediate revocation of access and, where appropriate, further administrative or legal action.

Restricted

This permission level grants access to restricted content that is available only to individuals who have either successfully completed a background check through our organization or hold a valid license as a security professional. The materials accessible under this level may contain sensitive, non-public, or professional-use information intended to support security operations, training, or industry best practices. Access is provided solely for legitimate, authorized purposes and is subject to ongoing compliance with all applicable laws, licensing requirements, and terms of use. Any unauthorized sharing, reproduction, or misuse of this content may result in immediate revocation of access and potential administrative or legal consequences.

Law Enforcement Only

This permission level grants access to content that is strictly restricted to verified law enforcement personnel and is intended solely for official, professional, and training-related use. Materials available under this access level may include sensitive operational concepts, tactics, procedures, or instructional resources that are not appropriate for public distribution. Access is provided only after verification of law enforcement credentials, and use of this content is subject to all applicable laws, agency policies, and ethical standards. Unauthorized sharing, reproduction, or use of this material outside of a legitimate law enforcement context is strictly prohibited and may result in revocation of access and further administrative or legal action.

Verifying Your identity gives you access to more of our classes. Please see available options below.