Associate, Security Engineer Vulnerability & Pen Test

Tags: Environment
  • Added Date: Wednesday, 14 May 2025
5 Steps to get a job in the United Nations

Requisition ID 35649 Office Country Bulgaria Office City Sofia Division Information Technology Contract Type Fixed Term Contract Length 3 years Posting End Date 28/05/2025

Are you an cyber expert with an passion for finding the cracks before the criminals do? Weโ€™re searching for an Offensive Security Expert to join the front lines of our cyber defense. Youโ€™ll lead offensive security operations, scanning systems, probing weaknesses, and simulating real-world attacks using standard offensive tooling. From validating vulnerabilities through hands-on exploitation to crafting custom scripts that expose hidden threats, your work will drive critical security insights and real-time risk reduction.

This role is built for someone with deep technical expertise and an hacker mindset, fluent in web technologies, OWASP Top 10, and the inner workings of modern attack vectors. Youโ€™ll also dive into threat intelligence, develop hypotheses, and contribute to smarter detection strategies. If youโ€™re driven to outsmart adversaries, influence real-world defense strategies, and play an key role in proactive security, your next mission starts here.

Accountabilities & Responsibilities

โ€ข Plans, develops and executes vulnerability scans of organization information systems
โ€ข Identifies and resolves false positive findings in assessment results
โ€ข Performs reconnaissance and information collection on the target environment or attack surface
โ€ข Identifies potential weaknesses and vulnerabilities on assets (i.e., end points, applications, users)
โ€ข Validates weaknesses via exploitation, and reports their findings
โ€ข Recommends security controls and/or corrective actions for mitigating technical and business risk
โ€ข Creates hypotheses for analytics and testing of threat data
โ€ข Analyses data from threat and vulnerability feeds and analyses data for applicability to the organisation
โ€ข Generates reports on assessment findings and summarises to facilitate remediation tasks
โ€ข Shares lessons learned, initial indicators of detection and opportunities for strengthening signature-based detection capabilities

Knowledge, Skills, Experience & Qualifications

๐Ÿ“š ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—š๐—ฒ๐˜ ๐—ฎ ๐—๐—ผ๐—ฏ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—จ๐—ก ๐—ถ๐—ป ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ! ๐ŸŒ๐Ÿค ๐—ฅ๐—ฒ๐—ฎ๐—ฑ ๐—ผ๐˜‚๐—ฟ ๐—ก๐—˜๐—ช ๐—ฅ๐—ฒ๐—ฐ๐—ฟ๐˜‚๐—ถ๐˜๐—บ๐—ฒ๐—ป๐˜ ๐—š๐˜‚๐—ถ๐—ฑ๐—ฒ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—จ๐—ก ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ฒ๐˜€๐˜ ๐˜€๐—ฎ๐—บ๐—ฝ๐—น๐—ฒ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—จ๐—ก๐—›๐—–๐—ฅ, ๐—ช๐—™๐—ฃ, ๐—จ๐—ก๐—œ๐—–๐—˜๐—™, ๐—จ๐—ก๐——๐—ฆ๐—ฆ, ๐—จ๐—ก๐—™๐—ฃ๐—”, ๐—œ๐—ข๐—  ๐—ฎ๐—ป๐—ฑ ๐—ผ๐˜๐—ต๐—ฒ๐—ฟ๐˜€! ๐ŸŒ

โš ๏ธ ๐‚๐ก๐š๐ง๐ ๐ž ๐˜๐จ๐ฎ๐ซ ๐‹๐ข๐Ÿ๐ž ๐๐จ๐ฐ: ๐๐จ๐ฐ๐ž๐ซ๐Ÿ๐ฎ๐ฅ ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ ๐ก๐จ๐ฐ ๐ญ๐จ ๐ ๐ž๐ญ ๐š ๐ฃ๐จ๐› ๐ข๐ง ๐ญ๐ก๐ž ๐”๐ง๐ข๐ญ๐ž๐ ๐๐š๐ญ๐ข๐จ๐ง๐ฌ ๐๐Ž๐–!

โ€ข Highest level of technical expertise in cybersecurity, including deep familiarity with relevant penetration and intrusion techniques and attack vectors
โ€ข Strong understanding of web technologies
โ€ข Solid grasp of core security fundamentals and concepts
โ€ข Familiarity with the Open Web Application Security Project (OWASP) top 10 vulnerabilities
โ€ข Knowledge of offensive tools such as: Metaspoit, Kali Linux, Cobalt Strike, Mimikatz or a similar tool
โ€ข Proficient at creating their own scripts regular expressions in their preferred scripting language
โ€ข Technical knowledge in system security vulnerabilities and remediation techniques, network and web-related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, etc.)
โ€ข Technical knowledge in security engineering, system and network security, authentication and security protocols
โ€ข The following certifications desired but not essential: Certified ethical hacker (CEH), global information assurance certification (GIAC), GIAC certified pen tester (GPEN), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), offensive certified security professional (OSCP) and offensive security certified (OSC)

What is it like to work at the EBRD?

Our agile and innovative approach is what makes life at the EBRD a unique experience! You will be part of a pioneering and diverse international organisation, and use your talents to make a real difference to people's lives and help shape the future of the regions we invest in.

The EBRD environment provides you with:

  • Varied, stimulating and engaging work that gives you an opportunity to interact with a wide range of experts in the financial, political, public and private sectors across the regions we invest in;
  • A working culture that embraces inclusion and celebrates diversity;
  • An environment that places sustainability, equality and digital transformation at the heart of what we do.

    Diversity is one of the Bankโ€™s core values which are at the heart of everything it does. A diverse workforce with the right knowledge and skills enables connection with our clients, brings pioneering ideas, energy and innovation. The EBRD staff is characterised by its rich diversity of nationalities, cultures and opinions and we aim to sustain and build on this strength. As such, the EBRD seeks to ensure that everyone is treated with respect and given equal opportunities and works in an inclusive environment. The EBRD encourages all qualified candidates who are nationals of the EBRD member countries to apply regardless of their racial, ethnic, religious and cultural background, gender, sexual orientation or disabilities. We offer hybrid and flexible working arrangements and believe we operate at our best when collaborating 3 days a week in person (minimum).

    Please note, that due to the high volume of applications received, we regret to inform you that we are unable to provide detailed feedback to candidates who have not been shortlisted (for further consideration).

Recommended for you