Vulnerability Assessment And Penetration Testing

Govhire Arlington , VA 22201

Posted Yesterday

Provides Vulnerability Assessment and Penetration testing support to a Cabinet level federal agency. Contributes to a team of information assurance professionals working to improve network security posture.

Must possess three (3) years of substantive IT knowledge and demonstrate hands-on expertise and/or training in areas of emerging technologies. The candidate must have hands-on experience and expertise with ethical hacking, firewall and intrusion detection/prevention technologies, secure coding practices and threat modeling.

Able to conduct PenTests and Vulnerability Assessments using Automated and Manual TTPs.
Have an understanding of common Web Application vulnerabilities like SQLi, XSS, CSRF, and HTTP Flooding.
Must be able to use at least two of the following proficiently and instruct others on them: Nessus, Burp, Metasploit Framework/Pro, and the Social Engineering Toolkit.
Must have solid working experience and knowledge of Windows and Unix/Linux operating system
A familiarity of Network and System architecture analysis. Fundamentals of network routing & switching and assessing network device configurations
Scripting (Windows/*nix), Bash, Python, Perl or Ruby, Systems Programming
Strong familiarity with OWASP top 10, PTES and NSA Vulnerability and Penetration Testing Standards.
Must be able to work alone or in a small group.

Desired Qualifications
OSCP, GIAC GPEN, GWAPT or other Penetration Testing certifications
Certified Ethical Hacker

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
MidSr Red Teamer Penetration Tester


Posted 2 weeks ago

VIEW JOBS 11/5/2019 12:00:00 AM 2020-02-03T00:00 <p><strong>OVERVIEW:</strong></p><p>phia LLC is seeking highly skilled full time W2 and 1099 Red Teamers/Penetration Testers to join our team of qualified, diverse individuals in support of the Department of Homeland Security's (DHS) National Cybersecurity Assessments and Technical Services (NCATS) program providing vulnerability assessments, development of assessment methodologies, and technical program advisement. </p><p>Come and join our team and be a part of a unique opportunity to conduct assessments across the federal government, state and local governments, as well as, critical infrastructure and private companies. The assessment length can vary, based on the number and type of services requested, but a typical assessment will take place over a two-week period. The first week being conducted in a lab based in Northern Virginia, and the second week at the customer's location, internal to their network.</p><p><strong>DUTIES:</strong></p><ul> <li>Independently lead and/or conduct vulnerability/pentesting assessments using approved tools and following an approved methodology, scope, and rules of engagement.</li> <li>Identify security vulnerabilities that could allow an attacker to compromise client information or systems.</li> </ul><ul> <li>Performs assessments of systems and networks within the enterprise and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. </li> <li>Measures effectiveness of defense-in-depth architecture against known vulnerabilities and attack techniques. </li> <li>Conduct and/or support authorized penetration testing on enterprise network assets with a focus on application security.</li> <li>Define procedures for penetration testing assessment for servers, endpoints, network appliances, and applications.</li> <li>Perform application security assessments of key business services and provide written reports on the security posture of those systems.</li> <li>Collaborate with DHS and assessed organizations to identify and defend against common attack vectors.</li> <li>Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.</li> <li>Advise government and assessed organization’s leadership on Plans of Action and Milestones (POA&amp;Ms) for vulnerability remediation.</li> </ul><p><strong>Requirements</strong></p><p><strong>KEY REQUIREMENTS:</strong></p><ul> <li>5-9+ years of experience</li> <li>Diverse experience in cyber security vulnerability assessments with a focus on application security assessments, or equivalent combination of education and work experience</li> <li>Ethical hacking experience including experience in Information Security, application vulnerability testing, code-level security auditing, and secure code reviews</li> <li>Demonstrating leadership ability</li> <li>Working knowledge of various operating systems, tools, and scripting languages such as *NIX, Windows, Kali Linux, Cobalt Strike, Metasploit, Nmap, Nessus, EyeWitness, WireShark, Powershell, Python, etc.</li> <li>Bachelor’s Degree in a technical specialty such as cyber security, computer science, management information systems or related IT field [relevant work and educational experience may be substituted for degree]</li> <li><strong>Certifications: (One or more required) OSCE, OSCP, GPEN or equivalent Red Team certs </strong></li> <li>CISSP and CEH are a bonus, but not required</li> </ul><p><strong>DESIRED KNOWLEDGE, SKILLS AND ABILITIES:</strong></p><ul> <li>Working knowledge of Colbalt Strike, Immunity Canvas, Core Impact and similar GOTS/COTS platforms</li> <li>Ability to develop or modify exploits based on vulnerability reports</li> <li>Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).</li> <li>Knowledge of laws, regulations, policies, and ethics as they relate to penetration testing. </li> <li>Knowledge of ethical hacking principles and techniques.</li> <li>Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).</li> <li>Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)</li> <li>Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).</li> <li>Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).</li> <li>Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).</li> <li>Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).</li> <li>Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).</li> <li>Knowledge of programming language structures and logic.</li> <li>Skill in conducting application vulnerability assessments.</li> <li>Skill in mimicking threat behaviors.</li> <li>Skill in the use of penetration testing tools and techniques.</li> <li>Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.).</li> <li>Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).</li> <li>Skill in performing impact/risk assessments.</li> <li>Skill to develop insights about the context of an organization’s threat environment.</li> <li>Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.</li> <li>Ability to apply programming language structures (e.g., source code review) and logic.</li> <li>Ability to share meaningful insights about the context of an organization’s threat environment that improve its risk management posture.</li> </ul><p><strong>WORK SCHEDULE</strong>: Typically Core hours</p><p><strong>TRAVEL</strong>: Up to 50%; one week from local lab environment within Northern Virginia and one week at assessment organization onsite (typically CONUS)</p><p><strong>TELEWORK ELIGIBILITY:</strong> N/A</p><p><strong>SECURITY REQUIREMENTS: </strong>Secret+ and DHS EOD eligible </p><p><strong>Benefits</strong></p><p><strong>COMPANY OVERVIEW:</strong><br></p><p>phia LLC ("phia") is a Northern Virginia based, 8a certified small business established in 2011 with focus in Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis &amp; Incident Response, Cyber Architecture &amp; Capability Analysis, Cyber Policy &amp; Strategy, Information Assurance/Security, Compliance, Certification &amp; Accreditation, Communications Security, Traditional Security, and Facilities Security. phia also provides cyber operations support functions such as: Program and Process Management, Engineering, Development, and Systems Administration that allows for Cyber Operations to efficiently integrate our customer’s missions and objectives. phia supports various agencies and offices within the Department of Defense (DoD), Federal government, and private/commercial entities.</p><p>phia offers excellent benefits for full time W2 candidates to enhance the work-life balance, these include the following:</p><ul> <li>Medical Insurance</li> <li>Dental Insurance</li> <li>Vision Insurance</li> <li>Life Insurance</li> <li>Short Term &amp; Long-Term Disability</li> <li>401k Retirement Savings Plan with Company Match</li> <li>Paid Holidays</li> <li>Paid Time Off (PTO)</li> <li>Tuition and Professional Development Assistance</li> <li>Flex Spending Accounts (FSA)</li> <li>Parking Reimbursement</li> <li>Monthly Payroll</li> </ul> Phia Arlington VA

Vulnerability Assessment And Penetration Testing