Job title : Penetration Tester
Job Location : Western Cape, Stellenbosch
Deadline : November 24, 2025
Quick Recommended Links
- Jobs by Location
- Job by industries
Purpose Statement
To ensure that the business is prepared and skilled to mitigate any cyber security threat throughAssessing and testing the applications and processes of the Bank.Identifying potential areas of weaknesses from a security perspective.Playing a key role in developing world class cyber security capabilities within the Bank by means of knowledge transfer, education, training and research.Experience
Minimum
3 – 5 years’ experience in cyber security testingRisk identification and communication relating to cyber securityIdeal
5+ years in cyber security testing2 – 3 years financial services / banking experienceExperience with the Agile and DevOps modelsQualifications (Minimum)
Grade 12 National Certificate / VocationalCertification in Information TechnologyQualifications (Ideal or Preferred)
A relevant tertiary qualification in Information Technology or Information Technology - IT EngineeringKnowledge
Minimum
Manual and automated security testing of infrastructure, networks, and web applications servicesTechnical vulnerability assessments (CVE and CVS database knowledge)Best practice technical reviews; using company and industry standardsCommon network protocols, system architecture, and operating systemsLogical access reviews and auditKnowledge of TTP's / MITRE Attack Framework, threat-attack landscapeStrong communication and reporting skills, articulate risk to businessSolution and white-boarding of systems to be assessedAbility to readunderstand at least 1 scripting language (e.g. Python, Bash, PowerShell, CPHPJava code)Experience in testing web services, web mobile applications, and cloud applicationsProficiency with pen-testing tools (Security distro’s and intercepting proxy tools)Understanding and familiarity of vulnerabilities included in methodologies such as OWASP Top 10 (Web, Mobile, API) and OSSINTUnderstanding of system architectures and platforms (e.g. Windows, Unix, Linux and RedHat)Understanding of tiered web application service cloud architectures and related databases (MySQL, MSSQL and Oracle)Understanding of networking protocols and architectures, WAF’s, web and reverse-proxies, DLP, e-mail proxy, DAM, firewalls and perimeter security technologies End User Infrastructure Service technologies (e.g. Print Management Solutions)Ideal
Cyber Security Threat modelling and Attack-Path mappingConducting and participating in Red-Team Purple teaming exercisesFamiliarity with industry regulatory requirements, specific to information securityProficiency in scripting with at least 1 scripting language (e.g. Python, Bash, PowerShell)Reverse engineering of malware exploitsSkills
Communications SkillsComputer Literacy (MS Word, MS Excel, MS Outlook)Attention to DetailAnalytical SkillsProblem solving skillsICT jobs#J-18808-Ljbffr