About the Company
Sentrabyte Digital Solusi is a remote-first cybersecurity company with over five years of operational experience. We specialize in advanced security assessments, real-world risk validation, and high-impact penetration testing for global clients.
Our work culture is focused, fully distributed, results-driven, and free from unnecessary bureaucracy. We value clarity, professionalism, and strong technical execution.
Role Overview
We are seeking a Cyber Security Specialist (Red Team / Offensive Security) with proven expertise in real-world exploitation and structured penetration testing.
This position is well-suited for professionals who prefer autonomy, enjoy technical depth, and take pride in delivering accurate, high-impact security outcomes.
You will conduct authorized penetration tests, validate vulnerabilities, and contribute to our internal testing frameworks. Clear expectations, consistent workflow, and measurable results are key components of this role.
Key Responsibilities
Requirements
Strong understanding of post-exploitation activities, including:
Enumeration after initial access
Privilege escalation (Linux/Windows)
Credential access and token abuse
Lateral movement or internal pivoting (where scope allows)
Nice to Have
Why Work With Us
Compensation level is determined by proven exploitation capability, testing consistency, and technical depth.
Salary Range
Junior / Intermediate: USD 18k – 30k
Mid-Level: USD 30k – 45k
Senior / Advanced Red Team: USD 45k – 80k+
Documented, real-world experience obtaining stable OS-level shells (Linux and/or Windows) on production or authorized environments.
Candidates must be able to clearly explain at least one end-to-end exploitation flow, including:
Initial access vector
How shell access was achieved
Execution context (user / privileges)
What actions were performed immediately after gaining the shell
Candidates without hands-on get-shell and post-exploitation experience will not be considered for this role, regardless of application security or reporting background.
Applicants may be asked to verbally walk through a real exploitation scenario during the interview.
This role is not suitable for candidates focused primarily on application security, secure code review, or vulnerability reporting without hands-on OS-level exploitation experience.