Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
🤖 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.
Evolve Security • United States
Role & seniority: Penetration Testing Engineer – Application Security, mid-level (3–5+ years in pen testing; independent tester within domain; client-facing on engagements)
Stack/tools: Web/app testing: Burp Suite Pro, OWASP ZAP; API testing: Postman, REST/GraphQL; scanners/exploits: Nmap, Nessus, Metasploit, Cobalt Strike; scripting: Python, PowerShell, Bash; methodologies: OWASP WSTG; auth protocols: OAuth, SAML, MFA, JWT; code-assisted testing (grey-box) and manual techniques
Independently scope, plan, and execute penetration tests within assigned domain; lead technical execution on projects
Produce detailed findings reports with practical remediation guidance; ensure accuracy and minimize false positives; contribute to knowledge base
Serve as technical client focal point; conduct briefings, vulnerability walkthroughs, and respond to stakeholder questions
Must-have skills: 3–5 years pen testing experience; domain mastery (e.g., Web App Security beyond OWASP Top 10); strong manual testing and exploit development; proficiency with the listed tools; scripting for automation; clear, actionable reporting; effective client-facing communication
Nice-to-haves: Industry certifications (OSCP, GWAPT, GPEN, OSWE); secure code review; cloud/container environments experience; broader API/Frontend client-side testing; cross-domain security testing
Location & work type: Hybrid/remote work; role based in or with Evolve Security (Chicago);
The Penetration Testing Engineer – Application Security is a mid-level role for a tester who has grown beyond the basics and can independently execute penetration tests within a primary domain of expertise. Engineers are offensive security subject matter experts – conducting full assessments with minimal supervision, contributing to methodology improvements, and acting as a point of contact for clients during engagements. By this stage, they are capable of scoping and planning a test in their domain, executing tests, and producing and communicating detailed reports with practical remediation advice. Mid-level testers act as the technical client focal within engagements, leading technical execution for assigned projects.
Typical Experience: ~3–5 years of penetration testing experience, during which they have performed numerous assessments. At this point, they have a track record of completed pen tests and proven competencies.
Domain Expertise: Mastery in at least one penetration testing domain. For example, an engineer might be an expert in Web Application Security – adept with advanced web vulnerabilities (beyond OWASP Top 10, including logic flaws, deserialization, etc.), skilled in using Burp Suite for complex testing, and possibly familiar with secure code review.
Technical Skills: Strong practical skills and tool usage. Mid-level testers are comfortable with a variety of pen testing tools and techniques. This includes network scanners (Nmap, Nessus), exploitation frameworks (Metasploit, Cobalt Strike), web testing suites (Burp Suite, OWASP ZAP), and scripting/programming to automate tasks or develop custom exploits (common languages include Python, PowerShell, or Bash). Understanding manual testing techniques – for example, crafting customized payloads, bypassing filters, or chaining vulnerabilities. An engineer at this level is often responsible for ensuring the accuracy of findings (minimal false positives) and may contribute new findings to the team’s knowledge base.
Soft Skills: Solid communication and consulting skills. By now, the engineer can write thorough technical reports that require only light review, translating technical findings into clear, actionable recommendations. They are also responsive and growing in client-facing abilities, able to lead client briefing calls, deliver vulnerability walkthroughs, and handle questions from stakeholders. Their time management and project coordination skills have improved, enabling them to handle multiple projects or deadlines.
Certifications (Optional): Many mid-levels pen testers obtain well-regarded certifications as a by-product of developing their skills. Examples include OSCP, GWAPT (Web Application Testing), GPEN (Network Penetration), OSWE (Web Exploit Developer), etc. These certifications reinforce their domain expertise, but hands-on experience and successful engagements remain the primary proof of competency.