Your next hire is out there for as low as $10.74/hr USD.

We'll help you hire a Remote Penetration Tester for significantly cheaper than hiring a US employee.

or πŸ“ž call our office anytime, (860) 500-1469

Person typing on a laptop, wearing a yellow sweater and bracelets.

Why hire with The People Company?

Low cost by hiring from the Philippines and Latin America

Your company's next remote penetration tester lives in the Philippines or Latin America, but has a great understanding of Western work culture!

Speaks incredible English

All of our hires speak English at a C2 level or above -- the highest level of qualification provided by the Cambridge Assessment.

Years of experience being a remote penetration tester

The average candidate we place has 7+ years of experience working for US companies as a remote penetration tester. You'll get someone who can hit the ground running!

or πŸ“ž call our office anytime, (860) 500-1469

Stop overpaying for labor, and come join The People Company!

🀒 $10,000 USD per month

average πŸ—½ US salary

πŸ‡΅πŸ‡­ $1,890 USD per month

average Philippine salary for remote penetration testers

πŸ‡»πŸ‡ͺ πŸ‡¦πŸ‡· πŸ‡²πŸ‡½ $2,268 USD per month

average LatAm salary for remote penetration testers

From $10.74/hr, all-in. No upfront fees, our fee is included in the rate.

$0 – your new hire’s first week. We pay their salary while you get comfortable with them.
$0 – payroll tax, workman’s comp, unemployment insurance, benefits, etc. or anything else you have to pay with a US employee.
$0 – onboarding fees. We give each customer personalized, white-glove service.
$0 – recruiting fees. We seek out, interview, and vet your new hire for free.
$0Β – payroll & global compliance. We take care of all of the headache that comes w/ hiring someone internationally.
$0Β – unlimited support. Get unlimited phone & email support with managing/onboarding your hire.

or πŸ“ž call our office anytime, (860) 500-1469

How does it work?

1. Hop on a call

We’d hop on a phone call and get a little more context as to what you and your team are spending their day on, and what you’d like to outsource.

We’ll use this data to find the perfect assistant (or assistants, depending on your org size!)

Timeframe: 1-2 days

2. We headhunt

Our headhunter would take the data from our phone call and find candidates from our talent pool with experience in supporting teams in your industry.

Bonus points for experience with your CRM and tools, and a great culture fit.

Timeframe: 2-3 days

3. Interview & trial

We’ll present three compelling candidates and you can interview as many of those as you’d like. When you’ve found a great assistant, we will pay their first week’s salary so you can be confident they’ll be a value-add.

If they’re not a good fit, we’ll work night and day to find someone who is.

Timeframe: 7 days

Expect remote penetration testers that can fit this job description:

They'll have proficiency in these tasks:

-Perform simulated cyberattacks on networks, applications, and systems to identify vulnerabilities that could be exploited by attackers.
-Conduct reconnaissance to gather information on system architecture and potential weaknesses, aiding in the planning of penetration tests.
-Utilize tools such as Metasploit, Burp Suite, and Nmap to identify open ports, weaknesses, and misconfigurations in target systems.
-Develop and execute custom exploits to test the resilience of systems against specific types of attacks.
-Document all findings in detailed reports, including descriptions of identified vulnerabilities, exploit methods, and recommended remediation steps.
-Work with IT and security teams to clarify test results and provide insights into how vulnerabilities could be addressed.
-Conduct re-tests on systems after vulnerabilities are patched to verify the effectiveness of implemented security measures.
-Stay updated on the latest hacking techniques and security vulnerabilities to ensure testing methods remain effective and relevant.
-Assess the security of web applications by testing for common vulnerabilities like SQL injection, cross-site scripting (XSS), and privilege escalation.
-Simulate social engineering attacks, such as phishing, to test the organization’s human defenses against cybersecurity threats.
-Follow strict ethical guidelines and obtain necessary permissions to conduct tests without disrupting normal business operations.
-Collaborate with compliance teams to ensure that penetration tests align with regulatory requirements and industry standards.

They'll know how to handle these responsibilities:

-Conduct simulated cyberattacks on applications, networks, and systems to identify and document potential vulnerabilities.
-Perform reconnaissance and gather information on target systems to aid in planning effective penetration tests.
-Utilize tools such as Nmap, Metasploit, and Burp Suite to identify system weaknesses and misconfigurations.
-Develop custom exploits to test the resilience of systems against specific attack vectors and evaluate security measures.
-Document test findings in comprehensive reports, detailing vulnerabilities, exploitation methods, and recommended fixes.
-Work with the IT and security teams to clarify vulnerabilities and provide insights on how to mitigate identified risks.
-Stay updated on the latest hacking techniques and tools to ensure penetration testing methods are current and effective.

They'll have these qualifications:

-Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Wireshark to effectively identify and exploit vulnerabilities.
-Strong knowledge of network protocols, operating systems, and web application security to understand and target potential weaknesses.
-Certifications such as CEH (Certified Ethical Hacker), OSCP (Offensive Security Certified Professional), or CISSP to validate expertise and industry knowledge.
-Excellent problem-solving skills to develop and execute custom exploits and adapt testing approaches based on system defenses.
-Familiarity with scripting languages like Python, Bash, or PowerShell to automate testing processes and create custom testing scripts.
-Strong analytical skills to document findings clearly, providing actionable recommendations in detailed reports.
-Understanding of ethical hacking standards and best practices to ensure tests are conducted responsibly and in compliance with regulations.

They'll be proficient in your 'tech stack', which may include:

Metasploit, Burp Suite, Nmap, Wireshark, Nessus, John the Ripper, Hydra, SQLmap, Aircrack-ng, Gobuster

or πŸ“ž call our office anytime, (860) 500-1469

RecruitU hires great team members at 18% of the US cost with The People Company

RecruitU used The People Company to place Rico, an administrative assistant who took off vital business processes. This saved the founders a ton of time and allowed them to focus on β€˜more important’ work.

Brooks Gammill, Co-Founder at RecruitU

⭐⭐⭐⭐⭐ "Hiring Rico through The People Company has been an absolute game changer. Since onboarding Rico I can now spend more time on sales and prospecting knowing that my all my administrative tasks are dealt with"

Scroll to Top

Before you leave! Have questions about hiring a virtual assistant?

Nathan
Nathan, Our Owner ↑

Someone is standing by to take your call 24 hours per day:

or click here to book some time with our owner, Nathan!