Skip to Main Content

Job Title


Origin/IP Bypass Specialist


Company : Malan Softtech Private Limited


Location : New delhi, Delhi


Created : 2025-05-08


Job Type : Full Time


Job Description

Position Title: Origin/IP Bypass Specialist (Codename: IPSniper)Department: Advanced Infrastructure Exploitation UnitLocation: Remote | Classified Global OperationsEmployment Type: Mission-Based ContractReports To: Strategic Exploitation StrategistTeam Structure: Embedded in Elite 4-Member Offensive Cyber CellCompany: Malan Softtech – Software & Network Security Engineering AgencyAbout Malan SofttechMalan Softtech is a next-generation offensive cybersecurity and software engineering firmfocused on deep infrastructure penetration, full-stack security research, and red-team operationsfor highly classified and high-risk digital environments. We operate at the cutting edge of cyberwarfare tactics, supporting government, enterprise, and confidential partners in navigatingcritical attack surfaces with precision and stealth.Role OverviewWe are seeking an elite Origin/IP Bypass Specialist to identify and trace actual server originshidden behind Cloudflare, Imperva, and other advanced reverse proxies or CDN solutions. Youwill utilize advanced reconnaissance, fingerprinting, and header manipulation tactics to uncoverreal endpoints while maintaining zero detection footprints.Key Responsibilities• Trace and expose real IP addresses masked by CDN and WAF providers• Circumvent reverse proxy obfuscation using advanced manual techniques• Exploit DNS caching, ASN inconsistencies, and SSL fingerprint misconfigurations• Perform deep recon using manual tools to avoid alerting detection systems• Subvert firewall and proxy rules through crafted header injections and path logic• Coordinate with internal Red Teams for full-spectrum offensive execution• Identify and exploit server-level misconfigurations (WHM/cPanel/Nginx/Apache)• Develop intelligent network behavior maps based on passive and active scansRequired Skills & Experience• Deep expertise in DNS/ASN tracking and IP discovery• Experience bypassing Cloudflare, Imperva, and other similar protection layers• Familiarity with advanced header manipulation (X-Forwarded-For, True-Client-IP,etc.)• Practical knowledge of exploiting legacy DNS entries and SSL traceability• Skilled in manual recon using dig, curl, nslookup, Netcraft, and others• Experience in server fingerprinting, subdomain enumeration, and logical chaining• Must maintain strict operational security (OPSEC) throughout all engagementsPreferred Recon Tools (Assistive Use Only)• Shodan, Censys, ZoomEye (for endpoint correlation)• DNS zone walkers and header-based cache exploit kits• SSL certificate history tracersMindset & Tactical Philosophy• Operate invisibly—zero alerts, zero footprints• Think like a CDN—exploit misalignment between DNS and application stack• Deliver results, not noise—pure tactical outcomes over method• Collaborate without friction in encrypted, remote-only environmentsExample Operation"Target website hides behind Cloudflare. Analyst identifies forgotten staging subdomain linkedto AWS, cross-references historical ASN data from 2022, confirms match through SSLfingerprint, and accesses /admin/upload.php directly, bypassing all active WAF layers."Engagement Model• Stealth-Based Contract (no reporting required)• Pay-per-Success: Based on confirmed origin discovery or endpoint access• Option to Extend: Tactical deployments based on mission fitHow to ApplySubmit a brief technical breakdown or screenshots of a manual origin/IP bypass you’veperformed. Include steps, headers used, and recon strategies applied (redacted for confidentialityif needed). Real-world experience is prioritized over tool reliance.