Penetration Tester III (Cybersecurity)
Мэтч & Сопровод
Для мэтча с этой вакансией нужен Plus
Описание вакансии
TL;DR
Penetration Tester III (Cybersecurity): Conducting comprehensive security assessments and red team engagements for federal government contracts with an accent on IoT, mobile, and cloud environment penetration testing. Focus on identifying vulnerabilities using MITRE ATT&CK and OWASP frameworks to improve the security posture of High Value Assets.
Location: On-site in Chandler, AZ. Active Secret clearance is required.
Salary: $60,000 – $180,000 USD
Company
provides IT services and cybersecurity solutions to over 30 Federal Agencies and various commercial customers nationwide.
What you will do
- Plan and conduct Red Team engagements and continuous penetration testing methodologies.
- Perform security assessments on IoT devices, mobile applications, and Federal/Commercial Cloud technologies.
- Conduct High Value Asset (HVA) Assessments.
- Utilize a variety of toolsets for information gathering and comprehensive penetration testing.
- Implement Red, Blue, and Purple Team assessment processes.
Requirements
- Active Secret clearance is required.
- Bachelor’s degree and 5-7 years of professional penetration testing experience.
- Proficiency with MITRE ATT&CK, OSSTMM, OWASP, NIST, PTES, and ISSAF methodologies.
- GPEN or GXPN certification, plus one of: GRTP, CRTL, OSCP, CRTP, CMWAPT, CEPT, CPT, or LPT.
- Ability to obtain CISA AES HVA Assessment Lead or Technical Lead certification.
- Experience in team leadership and managing projects against tight deadlines.
Culture & Benefits
- Competitive compensation package tailored to experience and skills.
- Strong commitment to hiring veterans, transitioning service members, and military spouses.
- Collaborative environment that values diverse perspectives.
- Recognition as an Inc. 5000 Fastest-Growing Private Company.
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →