Netradyne is looking for a Senior Cybersecurity Offensive Engineer to strengthen our systems and enhance our security posture by identifying and mitigating vulnerabilities. You will be responsible for conducting offensive security operations, threat intelligence, and supporting security operations.
What You'll Do
- Conduct vulnerability assessments and penetration testing on applications, networks, on-prem and cloud systems.
- Execute red team engagements to simulate real-world attacks, identifying vulnerabilities and exploitation paths.
- Document Red team Assessment process findings with remedial actions and after action report.
- Conduct proactive threat hunting through AI based Models.
- Stay informed on the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Proactively identify and mitigate CTI for ND and mitigate the same i.e. risks relevant to the transportation and technology sectors.
- Handle L2 cases, which are more advanced and complicated in nature and scope.
- Investigate potential security breaches, recommend corrective actions, and support incident response activities (IR).
- Partner with relevant stakeholders across the organization e.g. Product development, DevOps, and engineering teams to integrate secure practices.
- Lead internal training programs to promote a security-first culture across the organization.
What We're Looking For
- 7-10 years of experience in Security operations center, offensive security, ethical hacking, penetration testing, or related roles.
- Proven expertise as a Cybersecurity Offensive Engineer or similar position.
- Proficiency with security tools such as Burp Suite, Metasploit, Nessus, Nmap, Kali Linux, Qualys, SonarQube.
- Strong understanding of web, network, mobile, and IoT security.
- In-depth knowledge of OWASP Top 10, common attack vectors (SQL injection, XSS, CSRF, buffer overflow, etc.) across product lines Web, API, IOT, AI etc.
- Familiarity with vulnerability management tools (e.g., Qualys, Tenable) and secure coding practices.
- Handle & manage L2 (escalated) calls and provide resolution within mentioned timelines /SLA.
- Proficiency in scripting languages like Python, Bash, Ruby, or PowerShell.
- Familiarity with programming languages such as C, C++, Java, or Go.
- Strong problem-solving and creative thinking abilities to simulate real-world attacks and devise effective mitigation strategies.
- Exceptional verbal and written communication skills to document findings and collaborate effectively.
- Excellent organisational skills and attention to detail.
Nice to Have
- Hands-on experience with reverse engineering, exploit development, and malware analysis.
- Familiarity with DevSecOps tools and processes (static/dynamic code analysis).
- Knowledge of security frameworks and compliance standards (e.g., OWASP, NIST, SOC, CIS, GDPR, HIPAA, PIPEDA).
- Bachelor’s/Master’s degree in Computer Science, Information Security, or a related field.
- Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Cloud Security Certified Professional (CSCP).
Technical Stack
- Security Tools: Burp Suite, Metasploit, Nessus, Nmap, Kali Linux, Qualys, SonarQube
- Scripting & Programming: Python, Bash, Ruby, PowerShell, C, C++, Java, Go
Work Mode
This role is designated onsite in Bangalore.
Netradyne is an equal-opportunity employer. We do not discriminate based on race, color, ethnicity, ancestry, national origin, religion, sex, gender, gender identity, gender expression, sexual orientation, age, disability, veteran status, genetic information, marital status, or any legally protected status.




