Enable job alerts via email!

IT Security Specialist

Night Watchers

Islamabad

Remote

PKR 600,000 - 1,200,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An innovative firm is looking for a skilled IT Security Specialist to tackle complex digital access challenges. In this role, you will be responsible for recovering critical data and solving intricate security issues, all while adhering to strict confidentiality protocols. The ideal candidate will possess a strong background in cybersecurity, data recovery techniques, and ethical hacking. This is a unique opportunity to work in a dynamic environment where your problem-solving skills will make a significant impact. If you thrive in challenging situations and enjoy working with cutting-edge technology, this position is perfect for you.

Benefits

Flexible work schedules
Competitive pay
Remote-based opportunities
Potential for long-term collaboration

Qualifications

  • Expertise in cybersecurity and data access solutions is essential.
  • Hands-on experience in troubleshooting and ethical security analysis.

Responsibilities

  • Regain access to protected digital assets and resolve access issues.
  • Assess vulnerabilities and provide technical insights while maintaining confidentiality.

Skills

Cybersecurity
Data Recovery
Penetration Testing
Digital Forensics
OSINT
Network Security
Scripting
Analytical Skills
Problem-Solving
Attention to Detail

Tools

Kali Linux
Metasploit
Wireshark
John the Ripper

Job description

Job Description:

We are seeking an experienced IT Security Specialist to assist in retrieving important digital assets that have become inaccessible due to technical restrictions, lost credentials, or security protocols. The role involves solving complex access issues, troubleshooting system barriers, and developing strategies to restore essential data for confidential projects.

The ideal candidate should have expertise in cybersecurity, data access solutions, and ethical security analysis. This role is suited for problem solvers who enjoy tackling challenging tasks that require creativity and precision.

Primary Responsibilities:
  1. Regain access to protected or inaccessible digital assets
  2. Assist in recovering lost credentials and troubleshooting access barriers
  3. Develop strategies to bypass non-malicious security constraints
  4. Assess vulnerabilities in client-authorized systems and provide technical insights
  5. Handle assignments with strict confidentiality and discretion
Required Expertise:
  1. Strong understanding of encryption, cybersecurity protocols, and system security
  2. Hands-on experience in diagnosing and resolving access-related issues
  3. Familiarity with OSINT (Open-Source Intelligence) and forensic data recovery
  4. Knowledge of penetration testing tools for security assessment
  5. Ability to generate detailed technical reports on findings and solutions
Preferred Qualifications:
  1. Experience in password recovery, account restoration, and security consulting
  2. Background in cyber forensics or advanced data retrieval techniques
  3. Understanding of cloud storage access recovery and database security
  4. Ability to operate discreetly when working on confidential projects
Compensation & Benefits:

Competitive pay, adjusted to the complexity of each project

Flexible work schedules with remote-based opportunities

Potential for long-term collaboration on specialized assignments

Application Process:

Interested candidates should submit a resume along with examples of past experience in data recovery, system security, or digital access solutions. All applicants must comply with strict confidentiality agreements.

Job Specification:
Technical Skills
  1. Cybersecurity & System Security – Understanding how security measures work and how to navigate them.
  2. Penetration Testing – Identifying vulnerabilities in digital systems (ethical hacking techniques).
  3. Digital Forensics – Recovering and analyzing digital data, even from protected sources.
  4. Data Recovery & Access Restoration – Regaining access to lost, locked, or encrypted files.
  5. OSINT (Open-Source Intelligence) – Gathering intelligence from publicly available digital sources.
  6. Network Security & Protocols – Understanding firewalls, VPNs, and secure communication methods.
  7. Social Engineering Techniques – Knowing how to bypass security through non-technical means.
  8. Reverse Engineering – Analyzing software or systems to understand their inner workings.
  9. Scripting & Automation – Writing scripts (Python, Bash, etc.) to automate security tasks.
  10. Cloud Security & Database Access – Navigating cloud platforms and databases securely.
Problem-Solving & Analytical Skills
  1. Logical Thinking & Troubleshooting – Diagnosing issues and finding creative solutions.
  2. Adaptability & Critical Thinking – Adjusting techniques based on different security setups.
  3. Attention to Detail – Ensuring accuracy while working with complex systems.
Ethical & Discretionary Skills
  1. Confidentiality & Anonymity – Keeping sensitive work private.
  2. Risk Assessment & Security Awareness – Knowing how to operate while avoiding detection.
Preferred (Advanced) Skills
  1. Knowledge of Dark Web & Privacy Tools – Familiarity with TOR, encrypted messaging, etc.
  2. Experience with Brute-Force Attack Mitigation – Knowing how to both execute and prevent them.
  3. Use of Hacking Tools – Kali Linux, Metasploit, Wireshark, John the Ripper, etc.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.