Posted:
2/27/2026, 1:44:15 AM
Location(s):
Jalisco, Mexico ⋅ Guadalajara, Jalisco, Mexico
Experience Level(s):
Mid Level
Field(s):
Software Engineering
About the Role
We’re seeking a highly skilled Penetration Tester with hands-on offensive security experience to join our growing security team. In this role, you will assess the security posture of web applications, networks, cloud platforms, and internal infrastructures through realistic attack simulations.
This position is ideal for someone who enjoys challenging technical work, thrives in hands-on exploitation, and can translate findings into clear, risk-based guidance for both technical and non-technical audiences.
Key Responsibilities
•Perform web application, API, network, and infrastructure penetration tests
•Identify, exploit, and document security vulnerabilities in real-world scenarios
•Conduct manual testing beyond automated scanners
•Execute adversary-style attack chains (lateral movement, privilege escalation, AD abuse)
•Perform source code reviews (where applicable)
•Assess cloud environments (AWS, Azure, GCP) for common configuration and architectural weaknesses
•Produce high-quality reports with clear technical detail and business impact
•Present findings and remediation guidance to engineering and management teams
•Support remediation, mitigation validation, and retesting
•Stay current with vulnerabilities, exploit techniques, TTPs, and offensive security research
Required Skills & Experience
Technical Skills
•3+ years of hands-on penetration testing / offensive security experience
•Strong understanding of:
oWeb vulnerabilities (OWASP Top 10, API security issues)
oInternal network and infrastructure attack techniques
oActive Directory exploitation (Kerberoasting, delegation abuse, ACL misconfigurations, NTLM relay)
oPrivilege escalation on Windows and Linux
•Experience using core offensive tools:
oBurp Suite, Nmap, Metasploit
oBloodHound, CrackMapExec, Impacket
•Solid understanding of foundational concepts:
oTCP/IP, DNS, HTTP(S)
oAuthentication (Kerberos, NTLM, OAuth2, SSO)
•Comfortable working in:
oLinux & Windows environments
oBash, PowerShell, and basic Python scripting
•Strong reporting skills (technical clarity + business impact)
Soft Skills
•Excellent verbal and written communication skills
•Ability to explain risks to both technical and non-technical stakeholders
•Self-driven, curious, and proactive
•Effective time management across multiple engagements
•Professional client-facing demeanor
Nice to Have
•Certifications: OSCP, PNPT, CRTO, OSWE
•Red Team / adversary simulation experience
•Cloud penetration testing experience
•Source code review skills (Java, C#, Python, JavaScript)
•Threat modeling and attack path analysis
•Experience with EDR/AV evasion techniques (ethical/lab settings)
#LI-FCC3
#LI-fcc3Website: https://www.nxp.com/
Headquarter Location: Eindhoven, Noord-Brabant, The Netherlands
Employee Count: 10001+
Year Founded: 2006
IPO Status: Public
Last Funding Type: Post-IPO Debt
Industries: Apps ⋅ Automotive ⋅ Energy Efficiency ⋅ Information Technology ⋅ Manufacturing ⋅ Mobile ⋅ News ⋅ Semiconductor ⋅ Software ⋅ Video