Logo

Penetration Testing Engineer - Network Security

Evolve SecurityUnited States


No Relocation

Posted: January 22, 2026

Job Description

The Penetration Testing Engineer – Network Security is a hands-on client facing offensive security role responsible for executing network, cloud, and adversary-emulation engagements under established methodologies. This role goes beyond point-in-time vulnerability testing and actively contributes to red team and purple team operations, including social engineering, attack-path validation, and defensive collaboration.

Penetration Testing Engineers work closely with senior testers, red team leads, detection engineers, and clients to identify exploitable weaknesses, simulate real-world threat actor behavior, and validate security controls. This role is ideal for practitioners with a strong networking foundation who are ready to operate as adversaries while contributing to high-quality reporting and continuous improvement of testing capabilities.

The Penetration Testing Engineer – Network Security is a hands-on client facing offensive security role responsible for executing network, cloud, and adversary-emulation engagements under established methodologies. This role goes beyond point-in-time v...

Typical Experience

  • 3–5 years of experience in IT, cybersecurity, or offensive security
  • Prior exposure to penetration testing, red team activities, SOC collaboration, or adversary emulation
  • Experience performing internal, external, or cloud network security assessments

Core Responsibilities

Network & Infrastructure Penetration Testing

  • Execute internal and external network penetration tests, including attack-path discovery and privilege escalation
  • Perform port scanning, service enumeration, and network mapping using industry-standard tools
  • Identify and validate misconfigurations, weak authentication, segmentation failures, and trust boundary issues
  • Assess on-prem and cloud network architectures (AWS, Azure, hybrid environments)

Red Team & Purple Team Operations (Required)

  • Participate in red team engagements simulating real-world adversaries
  • Execute TTP-driven attacks aligned to frameworks such as MITRE ATT&CK
  • Support purple team exercises by collaborating with defensive teams to:
    • Validate detections
    • Tune alerts
    • Measure defensive coverage
  • Provide clear attacker-perspective feedback to blue teams and security leadership

Social Engineering (Required)

  • Support and/or execute social engineering campaigns, including:
    • Phishing (email-based and credential harvesting)
    • Vishing and pretexting (as authorized)
    • Physical security testing support (where in scope)
  • Assist in campaign planning, execution, and ethical handling of sensitive data
  • Document social engineering outcomes with clear business and risk context

Reporting & Communication

  • Draft clear, accurate technical findings with reproduction steps and evidence
  • Contribute to executive summaries that explain risk, impact, and attack feasibility
  • Communicate findings effectively to:
    • Technical teams
    • Defensive stakeholders
    • Non-technical leadership
  • Support remediation validation and re-testing activities

Tooling & Continuous Improvement

  • Use and help improve offensive tooling, scripts, and testing infrastructure
  • Support automation efforts for discovery, enumeration, and validation
  • Continuously develop skills in network attacks, cloud security, and adversary techniques

Technical Skills & Knowledge

Required Technical Skills

  • Strong understanding of:
    • TCP/IP, routing, DNS, DHCP
    • Network segmentation and trust boundaries
  • Hands-on experience with:
    • Port scanning and enumeration (e.g., Nmap)
    • Vulnerability identification and validation
  • Familiarity with common network attack vectors:
    • Weak credentials
    • Misconfigured services
    • Excessive trust and lateral movement paths
  • Working knowledge of firewalls, VPNs (IPSec/SSL), and access controls
  • Basic scripting for automation (Bash, Python, or PowerShell)

 

Cloud & Hybrid Environments

  • Navigating cloud platforms (AWS and/or Azure)
  • Understanding:
    • Security groups / NSGs
    • IAM users, roles, and policies
    • Storage services (S3, Blob Storage)
  • Identifying cloud-specific misconfigurations and exposure risk

Red / Purple Team & Social Engineering Requirements

This role requires demonstrated interest or experience in:

  • Adversary emulation and red team testing
  • Purple team collaboration with SOC and detection teams
  • Social engineering techniques and ethical execution
  • Translating attacker actions into defensive improvement opportunities

Candidates should be motivated to think like attackers while improving organizational resilience.

Soft Skills & Professional Expectations

  • Strong curiosity and desire to continuously improve offensive skills
  • Ability to accept feedback and iterate on findings and techniques
  • Professional judgment, ethical conduct, and respect for authorization boundaries
  • Clear written and verbal communication skills
  • Ability to collaborate effectively across offensive and defensive teams

Certifications (Optional but Beneficial)

While hands-on ability is prioritized, certifications that align with this role include:

  • Network or security fundamentals
  • Offensive security or red team–oriented certifications
  • Social engineering or adversary emulation training

Additional Content

The Penetration Testing Engineer – Network Security is a hands-on client facing offensive security role responsible for executing network, cloud, and adversary-emulation engagements under established methodologies. This role goes beyond point-in-time vulnerability testing and actively contributes to red team and purple team operations, including social engineering, attack-path validation, and defensive collaboration.

Penetration Testing Engineers work closely with senior testers, red team leads, detection engineers, and clients to identify exploitable weaknesses, simulate real-world threat actor behavior, and validate security controls. This role is ideal for practitioners with a strong networking foundation who are ready to operate as adversaries while contributing to high-quality reporting and continuous improvement of testing capabilities.

The Penetration Testing Engineer – Network Security is a hands-on client facing offensive security role responsible for executing network, cloud, and adversary-emulation engagements under established methodologies. This role goes beyond point-in-time v...

Typical Experience

  • 3–5 years of experience in IT, cybersecurity, or offensive security
  • Prior exposure to penetration testing, red team activities, SOC collaboration, or adversary emulation
  • Experience performing internal, external, or cloud network security assessments

Core Responsibilities

Network & Infrastructure Penetration Testing

  • Execute internal and external network penetration tests, including attack-path discovery and privilege escalation
  • Perform port scanning, service enumeration, and network mapping using industry-standard tools
  • Identify and validate misconfigurations, weak authentication, segmentation failures, and trust boundary issues
  • Assess on-prem and cloud network architectures (AWS, Azure, hybrid environments)

Red Team & Purple Team Operations (Required)

  • Participate in red team engagements simulating real-world adversaries
  • Execute TTP-driven attacks aligned to frameworks such as MITRE ATT&CK
  • Support purple team exercises by collaborating with defensive teams to:
    • Validate detections
    • Tune alerts
    • Measure defensive coverage
  • Provide clear attacker-perspective feedback to blue teams and security leadership

Social Engineering (Required)

  • Support and/or execute social engineering campaigns, including:
    • Phishing (email-based and credential harvesting)
    • Vishing and pretexting (as authorized)
    • Physical security testing support (where in scope)
  • Assist in campaign planning, execution, and ethical handling of sensitive data
  • Document social engineering outcomes with clear business and risk context

Reporting & Communication

  • Draft clear, accurate technical findings with reproduction steps and evidence
  • Contribute to executive summaries that explain risk, impact, and attack feasibility
  • Communicate findings effectively to:
    • Technical teams
    • Defensive stakeholders
    • Non-technical leadership
  • Support remediation validation and re-testing activities

Tooling & Continuous Improvement

  • Use and help improve offensive tooling, scripts, and testing infrastructure
  • Support automation efforts for discovery, enumeration, and validation
  • Continuously develop skills in network attacks, cloud security, and adversary techniques

Technical Skills & Knowledge

Required Technical Skills

  • Strong understanding of:
    • TCP/IP, routing, DNS, DHCP
    • Network segmentation and trust boundaries
  • Hands-on experience with:
    • Port scanning and enumeration (e.g., Nmap)
    • Vulnerability identification and validation
  • Familiarity with common network attack vectors:
    • Weak credentials
    • Misconfigured services
    • Excessive trust and lateral movement paths
  • Working knowledge of firewalls, VPNs (IPSec/SSL), and access controls
  • Basic scripting for automation (Bash, Python, or PowerShell)

 

Cloud & Hybrid Environments

  • Navigating cloud platforms (AWS and/or Azure)
  • Understanding:
    • Security groups / NSGs
    • IAM users, roles, and policies
    • Storage services (S3, Blob Storage)
  • Identifying cloud-specific misconfigurations and exposure risk

Red / Purple Team & Social Engineering Requirements

This role requires demonstrated interest or experience in:

  • Adversary emulation and red team testing
  • Purple team collaboration with SOC and detection teams
  • Social engineering techniques and ethical execution
  • Translating attacker actions into defensive improvement opportunities

Candidates should be motivated to think like attackers while improving organizational resilience.

Soft Skills & Professional Expectations

  • Strong curiosity and desire to continuously improve offensive skills
  • Ability to accept feedback and iterate on findings and techniques
  • Professional judgment, ethical conduct, and respect for authorization boundaries
  • Clear written and verbal communication skills
  • Ability to collaborate effectively across offensive and defensive teams

Certifications (Optional but Beneficial)

While hands-on ability is prioritized, certifications that align with this role include:

  • Network or security fundamentals
  • Offensive security or red team–oriented certifications
  • Social engineering or adversary emulation training