IT Security Specialist

IT Security Specialist

Experience
< 1 Year
Salary
70,000 - 150,000 PKR
Job Type
Full Time
Job Shift
Morning
Job Category
Traveling
No
Career Level
Non-Managerial
Telecommute
No
Qualification
Bachelors
Total Vacancies
5 Jobs
Posted on
Feb 2, 2025
Last Date
May 1, 2025
Company
Night Watchers, Pakistan
Location(s)

Job Description

We are seeking an experienced IT Security Specialist to assist in retrieving important digital assets that have become inaccessible due to technical restrictions, lost credentials, or security protocols. The role involves solving complex access issues, troubleshooting system barriers, and developing strategies to restore essential data for confidential projects.

The ideal candidate should have expertise in cybersecurity, data access solutions, and ethical security analysis. This role is suited for problem solvers who enjoy tackling challenging tasks that require creativity and precision.

Primary Responsibilities:

Regain access to protected or inaccessible digital assets

Assist in recovering lost credentials and troubleshooting access barriers

Develop strategies to bypass non-malicious security constraints

Assess vulnerabilities in client-authorized systems and provide technical insights

Handle assignments with strict confidentiality and discretion

Required Expertise:

Strong understanding of encryption, cybersecurity protocols, and system security

Hands-on experience in diagnosing and resolving access-related issues

Familiarity with OSINT (Open-Source Intelligence) and forensic data recovery

Knowledge of penetration testing tools for security assessment

Ability to generate detailed technical reports on findings and solutions

Preferred Qualifications:

Experience in password recovery, account restoration, and security consulting

Background in cyber forensics or advanced data retrieval techniques

Understanding of cloud storage access recovery and database security

Ability to operate discreetly when working on confidential projects

Compensation & Benefits:

Competitive pay, adjusted to the complexity of each project

Flexible work schedules with remote-based opportunities

Potential for long-term collaboration on specialized assignments

Application Process:

Interested candidates should submit a resume along with examples of past experience in data recovery, system security, or digital access solutions. All applicants must comply with strict confidentiality agreements.

Job Specification

Technical Skills

  • Cybersecurity & System Security – Understanding how security measures work and how to navigate them.
  • Penetration Testing – Identifying vulnerabilities in digital systems (ethical hacking techniques).
  • Digital Forensics – Recovering and analyzing digital data, even from protected sources.
  • Data Recovery & Access Restoration – Regaining access to lost, locked, or encrypted files.
  • OSINT (Open-Source Intelligence) – Gathering intelligence from publicly available digital sources.
  • Network Security & Protocols – Understanding firewalls, VPNs, and secure communication methods.
  • Social Engineering Techniques – Knowing how to bypass security through non-technical means.
  • Reverse Engineering – Analyzing software or systems to understand their inner workings.
  • Scripting & Automation – Writing scripts (Python, Bash, etc.) to automate security tasks.
  • Cloud Security & Database Access – Navigating cloud platforms and databases securely.

Problem-Solving & Analytical Skills

  • Logical Thinking & Troubleshooting – Diagnosing issues and finding creative solutions.
  • Adaptability & Critical Thinking – Adjusting techniques based on different security setups.
  • Attention to Detail – Ensuring accuracy while working with complex systems.

Ethical & Discretionary Skills

  • Confidentiality & Anonymity – Keeping sensitive work private.
  • Risk Assessment & Security Awareness – Knowing how to operate while avoiding detection.

Preferred (Advanced) Skills

  • Knowledge of Dark Web & Privacy Tools – Familiarity with TOR, encrypted messaging, etc.
  • Experience with Brute-Force Attack Mitigation – Knowing how to both execute and prevent them.
  • Use of Hacking Tools – Kali Linux, Metasploit, Wireshark, John the Ripper, etc.

Night Watchers

Information Technology and Services - Islamabad, Pakistan
© Copyright 2004-2025 Mustakbil.com All Right Reserved.