Senior-Level Red Cell Penetration Tester
25 days ago
Beltsville
Job Description Internetwork Consulting Services (ICS) is seeking an experienced Cyber Penetration Tester to become part of the Federal Strategic Cyber program. Location: Northern VA; Hybrid - flex if person can come on-site as/when needed. Program Overview The DSCM program encompasses cyber security, data analytics, engineering, technical, managerial, operational, logistical and administrative support to aid and advise DOS Cyber & Technology Security (CTS) Directorate. This includes protecting a global cyber infrastructure comprising networks, systems, information, and mobile devices all while identifying and responding to cyber risks and threats. Those supporting the DSCM program strive to leverage their expert knowledge and propose creative solutions to real-world cybersecurity challenges. About the Role • Support the Red Cell Team by performing and leading penetration tests to assess the security of customer systems., • Identify vulnerabilities and develop recommended remediations to satisfy mandated NIST 800-53 security controls., • Report and demonstrate findings to system owners and engineers., • Maintain Red Cell infrastructure., • Bachelor of Science and 5 years of relevant experience in Cyber/IT, or a Master of Science and 3 years of relevant experience in Cyber/IT. In lieu of a degree, 4 years of additional IT security or penetration testing experience may be considered., • Minimum of 2 years with penetration testing experience., • Possess one of the following certifications, OR be able to obtain before start date:, • CCNA Cyber Ops, CCNA-Security, CEH, CFR, Cloud+, CySA+, GCIA, GCIH, GICSP, SCYBER, Security+ CE, SSCP, • Demonstrated experience with Kali Linux., • Demonstrated penetration testing tools experience with Nmap, Burp Suite, Metasploit, etc., • Demonstrated ability in evaluating vulnerabilities, performing root cause analysis, and reporting findings utilizing assessment methodologies such as NIST SP 800-115, Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), OWASP Web Security Testing Guide (WTG), etc., • Demonstrated ability to lead a penetration test and guide Senior/Junior Penetration Testers., • U.S. citizenship required., • An active Secret security clearance., • Active Top Secret or TS/SCI clearance., • One of the following certifications or an alternate, verifiable certification demonstrating IT security competence:, • CompTIA CASP+, • ISC2 Certified Information Security Professional (CISSP), • ISC2 Certified Cloud Security Professional (CCSP), • ISC2 Information Systems Security Engineering Professional (ISSEP), • One of the following certifications or an alternate, verifiable certification demonstrating practical penetration testing competence:, • Offensive Security Certified Professional (OSCP), • Offensive Security Certified Professional (OSCP), • Hack the Box Certified Penetration Testing Specialist (CPTS), • TCM Security Practical Network Penetration Tester (PNPT), • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), • Zero Point Security Red Team Ops II, • Advanced understanding of the following:, • NIST Risk Management Framework (RMF) and the Assessment and Authorization (A&A) process., • Security principles such as CIA, IAAAA, access control models, risk management, etc., • Networking principles and technologies such as IP routing, TCP/UDP, VPNs, firewalls, NAT, etc., • Common network protocols such as SSH, FTP, SMTP, SMB, HTTP, etc., • Operating system principles such as process management, device management, user management, file systems, etc., • Data processing principles such as encoding, hashing, encryption, etc., • Scripting and programming languages such as Bash, Python, PowerShell, JavaScript, etc., • Common application vulnerabilities and exploits such as outdated components,, • permissions misconfigurations, lack of input validation, logging/monitoring failures, etc., • Common web application vulnerabilities and exploits such as XSS, SQLi, LFI, file uploads, broken authentication mechanisms, etc., • Active Directory (AD) enumeration and attacks such as kerberoasting, AS-REP roasting, abusing misconfigured privileges, crafting golden tickets, etc., • Public Key Infrastructure (PKI) and navigating IT environments implementing multifactor authentication., • Cloud technologies and platforms such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), etc.