Since 1998, Lostar is the leading Information Security firm, with more than 1000 projects.
Its main services are; Information Security Checkups such as Internet-Intranet Penetration Tests, Gap Analysis of world wide best practices like COBIT, ISO 27001, ISO 22301 and ISO 20000, related consultancy and data protection projects and also Employee Security Awareness Methodology trainings.
Lostar consultants, who are well trained and experienced, create the optimal-cost solutions for their customers with paying attention to technical and commercial needs.
Roots in Turkey, Lostar has 3 offices in 3 different cities such as Istanbul, London and Sakarya.
We work with the best to create the best service and value for our clients.
For latest news and updates please follow us on:
Twitter (TR): Lostar
Twitter (EN): Lostar_EN
Facebook (Jobs): LostarKariyer
and visit our web sites:
We are seeking a dynamic and detail-oriented individual to join our team as a Junior Penetration Tester. In this role, you will be instrumental in enhancing the cybersecurity posture of our client companies through a variety of specialized tasks.
Location: Preferably based in Istanbul.
Flexibility: Primarily remote work, with the requirement to attend on-site as needed.
At least 1 year of experience in penetration testing, either within a company or through bug bounty programs. (For those with bug bounty experience, candidates are required to demonstrate critical findings to validate their expertise and proficiency in the field.)
Experienced in vulnerability scanning and web application penetration testing.
Minimum requirement of graduation from a higher education institution (yüksek okul).
Passionate about cybersecurity and eager to learn.
Excellent problem-solving skills and attention to detail.
Strong communication skills, both written and verbal.
Ability to work independently and as part of a team.
Join us to embark on a challenging and rewarding career path in cybersecurity. Apply now to become a vital part of our security team!
Vulnerability Scanning: Conduct comprehensive vulnerability scans on the internal and external networks of assigned member firms, identifying and reporting potential risks.
Web Application Penetration Testing.
Risk Identification: Effectively identify and document relevant risks associated with vulnerabilities found during scans.
Red Team Activities: Participate in Red Team exercises and projects.
Ad Hoc Tasks: Perform additional tasks based on specific requests, demonstrating flexibility and adaptability to meet changing needs.
Originally posted on Himalayas