Remote Penetration Tester

Logo of Agile Defense

Agile Defense

πŸ’΅ $115k-$173k
πŸ“Remote - United States

Job highlights

Summary

Join Agile Defense as a Penetration Tester supporting a DHS team focused on advanced cyber analytics. This role requires advanced experience in security event monitoring, incident response, and penetration testing. Responsibilities include threat emulation, penetration testing, and developing mitigations. A minimum of five years of experience in assessing APT threats and penetration testing is required, along with OSCP certification and a Bachelor's degree. The position offers a competitive salary and a collaborative work environment emphasizing six core values: Happy, Helpful, Honest, Humble, Hungry, and Hustle. Remote work is available with occasional on-site requirements in Ashburn, VA.

Requirements

  • Possess OSCP certification
  • Hold a Bachelor's Degree
  • Have a minimum of five years of experience with assessing APT threats, Penetration Testing, Vulnerability Management, attack methodologies, forensics analysis techniques, malware analysis, attack surface comprehension, Cyber Threat Emulation operations, Cyber Advanced Threat Emulation Team operations and research, identification, and verification of new APT TTPs
  • Have experience with any three of the seven tools listed below: Kali Linux, Metasploit, Burp suite, Cobalt Strike, Tenable Nessus, Web Inspect, Scuba, Appdetective
  • Have a relevant degree or equivalent, and/or proven operational experience in penetration testing or cyber threat emulation
  • Have knowledge and experience in Penetration Testing, SOC support, and coordination with security teams to strengthen the overall security posture in addition to developing mitigations, including signature development and working with incident management teams to better design and implement signatures and response policies and procedures
  • Have Active Secret or DHS Agency Clearance

Responsibilities

  • Have a solid understanding of cyber threats and information security in the domains of TTP’s, Threat Actors, Campaigns, and Observables
  • Be an expert in penetration testing and exploit development and familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, big data analytics, and cyber defense operations
  • Assess APT threats
  • Conduct Penetration Testing
  • Manage Vulnerabilities
  • Analyze attack methodologies
  • Employ forensics analysis techniques
  • Analyze malware
  • Comprehend attack surfaces
  • Conduct Cyber Threat Emulation operations
  • Conduct Cyber Advanced Threat Emulation Team operations and research
  • Identify and verify new APT TTPs
  • Generate threat intelligence indicators during the course of Threat Emulation operations and apply/fine tune them across the enterprise network
  • Research and remain up to date with emerging threats and Threat Emulation methodologies
  • Map Cyber Key Terrain and generate priority target lists
  • Automate tasks and script at a basic level
  • Demonstrate familiarity with NIST and FISMA compliance
  • Possess strong proficiency in Report writing – a technical writing sample and technical editing test will be required if the candidate has no prior published intelligence analysis reporting
  • Provide subject matter expertise support in the detection, analysis, and mitigation of malware, trends in malware development and capabilities, and proficiency with malware analysis capabilities
  • Coordinate with security teams to strengthen the overall security posture in addition to developing mitigations, including signature development and working with incident management teams to better design and implement signatures and response policies and procedures

Preferred Qualifications

  • Have experience developing custom exploits and exploitation tools in support of authorized penetration tests or cyber threat emulation exercises
  • Possess one or more certifications for Analysts: GCIA, GCED, GCFE, GCTI, GNFA, GCIH, CND, ECSA, OSCP, OSEE, OSCE, GCFA, GREM, CHFI, CEH, GPEN, GWAPT, GISF, GXPN
  • Have experience with analyzing deceptive technologies such as honeynets
  • Be able to work with a cyber network defense organization to improve an organization’s detection capabilities
  • Have expertise in policies, industry trends, techniques related to penetration testing
  • Be an Existing Subject Matter Expert of Advanced Persistent Threat or Emerging Threats

Benefits

Remote work

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.

Similar Remote Jobs

Please let Agile Defense know you found this job on JobsCollider. Thanks! πŸ™