Remote Senior-Penetration-Tester

Logo of Agile Defense

Agile Defense

📍Remote - United States

Job highlights

Summary

Join Agile Defense as a Senior Penetration Tester (SME) and contribute to bringing adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility.

Requirements

  • Certifications: PNPT, OSCP, OSCE, GXPN, GPEN, GCIH, GWAPT, GCFA or possess a willingness to pursue certifications after hire
  • Bachelor’s degree/University degree or equivalent experience
  • 10+ years of relevant experience with the requirements below
  • Extensive experience working with Offensive Security Methodologies and Attack Simulation Techniques
  • Offensive Security testing tools. e.g., Cobalt Strike, Kali Linux, Bloodhound, Red Team Toolkits
  • Exploitation frameworks, e.g., Metasploit, CANVAS, Core Impact
  • Deep understanding of OSI model
  • OS Security. e.g. Unix/Linux, Windows, OSX
  • Understanding of common protocols. e.g. HTTP, LDAP, SMTP, DNS
  • Web application infrastructure. e.g. Application Servers, Web Servers, Databases
  • Demonstrated ability to collaborate with a variety of analytical groups and service delivery organizations
  • Advanced analytical and problem-solving skills
  • Consistently demonstrates clear and concise written and verbal communication
  • Proficient in interpreting and applying policies, standards and procedures
  • Demonstrated ability to remain unbiased in a diverse working environment

Responsibilities

  • Conduct Penetration Testing (application and/or infrastructure) and articulate security issues to both technical and non-technical audiences
  • Identify, research, validate, and exploit various known and unknown security vulnerabilities
  • Coordinate with business and technical contacts to assist in the development and delivery of secure solutions
  • Compose detailed, technical, attack narratives which outline specific attack chains utilized, clear impact of vulnerabilities discovered, and suggested paths to remediation which address root cause of identified weak points in enterprise security architecture

Preferred Qualifications

  • Experience leveraging the MITRE ATT&CK Framework
  • Vulnerability Assessment tools. e.g., Nessus, Qualys, Rapid7
  • Social Engineering campaigns. e.g. email phishing, phone calls, SET
  • Security devices, i.e. Firewalls, VPN, AAA systems
  • Web development and programming languages. e.g. Python, Perl, Ruby, Java, .Net

Job description

At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation’s most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: 613

Job Title:Senior Penetration Tester (SME)

Location: Fully Remote

Clearance Level: Active DoD - Public Trust

SUMMARY

A successful candidate will have verifiable experience in offensive security, attack simulation, scripting, and communication skills. Strong technical capabilities, and an understanding of in-scope systems to the organization with respect to operational impact. It is important as a key function of the role is to work closely with production teams of systems assessed.

JOB DUTIES AND RESPONSIBILITIES

·Conduct Penetration Testing (application and/or infrastructure) and articulate security issues to both technical and non-technical audiences

·Identify, research, validate, and exploit various known and unknown security vulnerabilities

·Coordinate with business and technical contacts to assist in the development and delivery of secure solutions

·Compose detailed, technical, attack narratives which outline specific attack chains utilized, clear impact of vulnerabilities discovered, and suggested paths to remediation which address root cause of identified weak points in enterprise security architecture

QUALIFICATIONS

Required Certifications

·Certifications: PNPT, OSCP, OSCE, GXPN, GPEN, GCIH, GWAPT, GCFA or possess a willingness to pursue certifications after hire

Education, Background, and Years of Experience

·Bachelor’s degree/University degree or equivalent experience

ADDITIONAL SKILLS & QUALIFICATIONS

Required Skills

·Qualifications (Senior)

·10+ years of relevant experience with  the requirements below:

·Extensive experience working with Offensive Security Methodologies and Attack Simulation Techniques

·Offensive Security testing tools. e.g., Cobalt Strike, Kali Linux, Bloodhound, Red Team Toolkits

·Exploitation frameworks, e.g., Metasploit, CANVAS, Core Impact

·Deep understanding of OSI model

·OS Security. e.g. Unix/Linux, Windows, OSX

·Understanding of common protocols. e.g. HTTP, LDAP, SMTP, DNS

·Web application infrastructure. e.g. Application Servers, Web Servers, Databases

·Demonstrated ability to collaborate with a variety of analytical groups and service delivery organizations

·Advanced analytical and problem-solving skills

·Consistently demonstrates clear and concise written and verbal communication

·Proficient in interpreting and applying policies, standards and procedures

·Demonstrated ability to remain unbiased in a diverse working environment

Preferred Skills

·Preferred Additional Skills:

·Experience leveraging the MITRE ATT&CK Framework

·Vulnerability Assessment tools. e.g., Nessus, Qualys, Rapid7

·Social Engineering campaigns. e.g. email phishing, phone calls, SET

·Security devices, i.e. Firewalls, VPN, AAA systems

·Web development and programming languages. e.g. Python, Perl, Ruby, Java, .Net

Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It’s how we show up every day. It’s who we are.

Happy - Be Infectious.

Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.

Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.

Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.

Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.

Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.

Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or © consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35©

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.
Please let Agile Defense know you found this job on JobsCollider. Thanks! 🙏