Rhino offers a range of deep-dive pentest services, from web/mobile apps to networks, social engineering, and AWS and cloud environments.
These services — and the security research that drives it — are performed by the Assessments (pentest) Team.
For the Assessments Team, developing expertise in each of these areas requires specialization on an individual level. No one’s an expert in everything, and complementary strengths make us stronger as a team.
Core Pentesters have assessments primarily focused on application pentesting (web/mobile), and network pentesting and social engineering based on individual preference. While these are often familiar technologies to most pentesters, deeper specialization is also expected — some Core Pentesters are experts in attacking mobile applications, where others have a background in AD exploitation.
All Contributor Roles at Rhino have 4 levels to establish seniority and expertise: (1) Associate, (2) Career, (3) Senior, and (4) Principal. Responsibilities and expectations are clearly defined at each level, as well as salary and compensation ranges as expertise grows.
As a preview of that structure, below is the summary of Rhino’s Pentest role/level structure:
Level Summary | Associate | Career | Senior | Principal | ||||
Relevant Experience | 0-2 years | 2-4 years | 4-7 years | 7-10 years | ||||
Title | Associate Pentester | Penetration Tester | Sr. Pentester | Principal Pentester | ||||
Level Summary | Entry-Level Pentest role. Can perform basic pentests with minimal assistance from others on the team. Learning more advanced pentest techniques, Djavan/reporting processes, and performing first research projects. | Mid-level role. Able to perform multiple pentest types independently and thoroughly.Comfortable with internal processes and techniques, and actively contributing to improve them. | Technical expert across multiple pentest domains, and mentor to others on the team.Executes complex Assessment projects and supports strategic needs for team (ie: recruiting/training processes) | Deep technical expert / technical leader.Provides technical direction for core services and research, leads and executes strategic needs for Assessment team (ie: recruiting/training processes).Executes most challenging Assessment projects. |
Here are the benefits offered to all pentesters –
When it comes to pentesters, we’re always hiring! However, what we’re looking for depends on the role.
For Core Pentesters, web pentest experience is the most critical technical skill. We perform a lot of web/mobile/API pentesting, and so the stronger the knowledge in performing these attacks, the better.
Academic Knowledge
For “Academic Knowledge”, we recommend the Webapp Hackers Handbook (v2) to start. It’s a great book for learning appsec and while it’s very thorough, it starts from the beginning (chapter 1 is a review of HTTP and web concepts).
Hands-On (Sandbox) Experience
Just reading from a book will only take you so far. You’ll need a hands-on lab environment where you can test out the concepts you’re learning in WAHH.
The labs from Web Security Academy are what we’d recommend here, which have several exercises for each vulnerability category (XSS, SQLi, Authentication bugs, etc). WSA also has the benefit of tracking your progress throughout the labs, giving you a ‘scoreboard’ of progress to share in interviews.
Tools
Once you have the book and labs, you’ll need to get relevant tools. While it’s a common route to download Kali Linux and try dozens of tools, we recommend starting by downloading Burpsuite (Community) and getting very familiar with that. Burp is the ‘swiss army knife’ of webapp pentesting and will be the one tool you’ll use every day.
Real-World Experience
You could spend weeks or months just going through these tools (and it would take you a long way!) but real-world experience is often where budding pentesters struggle in getting their foot in the door.
When you start getting comfortable with the above, sign up for bug bounties (HackerOne.com and bugcrowd.com) and try finding vulnerabilities in real-world applications. Start off with smaller/newer bounties which don’t offer financial rewards — there will be many fewer eyes on those programs, and give you a better chance at early wins demonstrating your experience in the real world.
As you start building your bug collection, add your HackerOne/BugCrowd profiles to your resume and mention the bugs you’ve found in the relevant section.
Even a few of these real vulnerabilities will be a gold star as you break into the industry — at Rhino, we’ve hired several Associate pentesters from this same training path!