PuraSec is growing! The number of assignments is increasing significantly and our hackers could use some support. Currently, the technical team consists of a mix of junior and more experienced pentesters with good communication skills. Are you looking for a really cool job as a hacker? Do you already have some experience or do you spend your free time working on CTFs or CVDs? Do you want to make customers more digitally secure without losing sight of their business objectives? Then we would love to hear from you. Read below to find out what an average day with us looks like!
🕤 08:42 You open your laptop, log into your email account and delete a “practice phishing email”, because you spot it immediately. The intern has also received a suspicious email and comes to you. Together with him, you analyse the email and your suspicions are confirmed: it was a phishing email. Well done!
This is a paragraph.
🕘 08:55 A fellow auditor comes to you and asks if you can help her check whether the encryption in the application they are auditing is adequate. You explain in simple terms why this encryption is adequate, while enjoying a nice cup of coffee.

🕥 09:28 Using Repeater in BurpSuite, you are checking IDORS on the web application of the project you are working on, because you are almost certain that something is wrong there. After a while, you find a way to download all sensitive data from the customer's web application. You call the customer's technical specialist and warn them immediately. This helps them right away, and you discuss the extensive “Proof of Concept” with them later in the report and pentesting review. You continue with your pentest.
🕚 11:01 Someone shoots at you with a Nerf gun, but you don't let that happen and fire back. A brief fight ensues, with arrows flying everywhere. Your manager has a minigun, but luckily he didn't see anything!
🕛 11:55 Your diary shows a technical intake scheduled for your next client. You discuss the details with them in a video call and assess the environment to be tested. Who is best at this and how much time do we need? Together with the project leader, you discuss a schedule that meets the client's wishes and the possibilities at PuraSec.
🕜 12:36 You walk to the kitchen and grab a toasted sandwich or a bapao from the pantry. You eat it with chilli sauce. Why? Because you can. Tomorrow you'll cook a healthy egg or have another healthy snack. Next week there's a pizza session, so take it easy for now!

🕑 13:37 You have just set up an SSH reverse tunnel that gives you access to an admin panel within the customer's office environment. You shout a little too loudly with joy. Fortunately, your colleagues put down their Nerf guns and you are not shot at.

🕒 15:03 After several days of penetration testing, you are now completely finished. You start writing the report. After about an hour, you are done. You read (and learn from) a number of blogs on the internet about the first “Proof of Concept” of a new exploit that has been published.
🕔 17:10 You tick off some tasks on your checklist and check the schedule for the coming period. You walk out the door with some colleagues, enthusiastically talking about a buffer overflow that you don't quite understand yourself yet. Your colleagues ask if you want to join them for the online CTF tonight. This time you decide not to participate, as you've been quite busy this week. That's okay, because it has to remain fun!
Are you excited about this working day? Then check out our current vacancies (no, it's not phishing)!




