Opens nxp.wd3.myworkdayjobs.com in a new tab
What You'll Do
- Perform web application, API, network, and infrastructure penetration tests •Identify, exploit, and document security vulnerabilities in real-world scenarios •Conduct manual testing beyond automated scanners •Execute adversary-style attack chains (lateral movement, privilege escalation, AD abuse) •Perform source code reviews (where applicable) •Assess cloud environments (AWS, Azure, GCP) for common configuration and architectural weaknesses •Produce high-quality reports with clear technical detail and business impact •Present findings and remediation guidance to engineering and management teams •Support remediation, mitigation validation, and retesting •Stay current with vulnerabilities, exploit techniques, TTPs, and offensive security research Required Skills & Experience Technical Skills •3+ years of hands-on penetration testing / offensive security experience •Strong understanding of: oWeb vulnerabilities (OWASP Top 10, API security issues) oInternal network and infrastructure attack techniques oActive Directory exploitation (Kerberoasting, delegation abuse, ACL misconfigurations, NTLM relay) oPrivilege escalation on Windows and Linux •Experience using core offensive tools: oBurp Suite, Nmap, Metasploit oBloodHound, CrackMapExec, Impacket •Solid understanding of foundational concepts: oTCP/IP, DNS, HTTP(S) oAuthentication (Kerberos, NTLM, OAuth2, SSO) •Comfortable working in: oLinux & Windows environments oBash, PowerShell, and basic Python scripting •Strong reporting skills (technical clarity + business impact) Soft Skills •Excellent verbal and written communication skills •Ability to explain risks to both technical and non-technical stakeholders •Self-driven, curious, and proactive •Effective time management across multiple engagements •Professional client-facing demeanor Nice to Have •Certifications: OSCP, PNPT, CRTO, OSWE •Red Team / adversary simulation experience •Cloud penetration testing experience •Source code review skills (Java, C#, Python, JavaScript) •Threat modeling and attack path analysis •Experience with EDR/AV evasion techniques (ethical/lab settings) #LI-FCC3 More information about NXP in Mexico... #LI-fcc3
Sourced directly from NXP Semiconductors’s career page
Your application goes straight to NXP Semiconductors.
Opens nxp.wd3.myworkdayjobs.com in a new tab
Specialisation
Open roles at NXP Semiconductors
541 positions
Job ID
/job/Guadalajara/Red-Team-PenTester_R-10061884
Get matched to roles like this
Upload your resume once. We’ll notify you when matching roles open up.
Join talent pool — freeSimilar Other roles
Samsung Semiconductor
Staff Technical Program Manager
San Jose, California, United States|Other
Samsung Semiconductor
Associate, Executive Administration
San Jose, California, United States|Other
Micron Technology
STAFF ENGINEER GFAC SASIA - ELECTRICAL
Fab 10A, Singapore|Other
Micron Technology
TEST HBM DATA ANALYST
Taichung - MTB, Taiwan|Other