Linksoft Technologies

Jr. Developer (Network Vulnerability)

Posted: 12 hours ago

Boost Your Application

Stand out with our professional, ATS-friendly resume templates designed to get you noticed by recruiters.

Download Resume Templates

Job Description

Role- Jr. Developer (Network Vulnerability)Experience- 1-3yrsLocation-Philippines, VietnamType- RemoteRole summaryA Junior NVT Developer builds and maintains Network Vulnerability Tests (NVTs) (i.e., scripts/tests used by vulnerability scanners) to detect known vulnerabilities and misconfigurations. In our environment, this work aligns to a structured NVT lifecycle (CVE identification → ticketing/triage → implementation → QA validation → release bundling → production release).This role is ideal for an early-career engineer who is strong in Linux + scripting (Bash/sh/Python) and wants to grow into vulnerability research and scanner test development. Familiarity with NASL (Nessus Attack Scripting Language) is a plus, as it’s commonly used for vulnerability test plugins/scripts (including in scanners like Nessus/OpenVAS).Core responsibilitiesImplement NVT scripts based on assigned CVEs / vulnerability requirements (following internal ticket workflow and definitions of done).Write reliable checks (minimize false positives/negatives) and document assumptions, prerequisites, and detection logic. (Quality risk is explicitly discussed in our NVT testing context.Reproduce and validate vulnerabilities in lab/test environments (Linux-based), using command-line tools and basic networking diagnostics.Support QA testing by clarifying expected results, edge cases, and environment needs; iterate quickly on fixes.Work with containers (Docker) to run scanners and test scripts consistently (nice-to-have; can be learned on the job).(Optional growth path) Contribute to a custom/enterprise NVT feed strategy that complements community coverage.Required skills (must-have)Scripting & automationBash / sh or Python: ability to write production-quality scripts (argument parsing, exit codes, logging, testability).Ability to parse outputs (stdout/stderr), manipulate text (grep/sed/awk or Python equivalents), and automate repeatable checks.Linux fundamentalsComfortable on Linux CLI: processes, permissions, packages, networking tools (e.g., curl, nc, ss/netstat, openssl s_client).Basic troubleshooting mindset: reproduce → isolate → validate.Networking & security basicsFamiliarity with vulnerability concepts: CVE, severity, exploitability, remediation basics.Practical understanding of TCP/UDP, ports, services, banners, and common protocols. (Internal requisition emphasizes TCP/UDP/SNMP/IP familiarity.)Engineering hygieneGit basics (branching, PRs, code review, commit discipline). (Internal requisition calls out Git/Bitbucket preference.)Nice-to-have skillsNASL (Nessus Attack Scripting Language) exposure—reading and modifying NASL scripts, understanding basic plugin structure.OpenVAS / GVM familiarity: understanding that OpenVAS uses a feed of vulnerability tests and supports a scripting language to implement tests; awareness of feed synchronization concepts.Docker (run scanners/labs locally; build minimal images; use volumes, networks).Any security tooling familiarity (scanner outputs, interpreting results, dealing with false positives/negatives).

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In