Logo
ClearanceJobs

Penetration Tester

ClearanceJobs, Fort George Meade, Maryland, United States

Save Job

Pen Tester

Provide penetration testing services using a variety of tactics, techniques, and procedures to identify exploitable vulnerabilities in networks and systems while also measuring compliance with organizational security policies, testing whether staff are aware of security issues, and ultimately determining the organization's risk to cybersecurity threats. Perform network mapping and reconnaissance, document rules of engagement to guide the scope, develops test plan, and assists with acquiring management approval. External Testing: Conduct a variety of penetration tests based on system's criticality, test objectives, and organization's requirements to include: Working with IT personnel to define scope for targeted testing Mimicking an outside attacker to gain access to system and what information can be accessed. Internal Testing: Mimic an outside an insider attack to determine risk employees with various access levels pose to the organization. Red Team Testing: Focus testing activity towards accessing specific target datasets. Testing methodology should include crafted e-mails, custom public websites, exploit code, and social engineering. Analyze test results, develop a report on discovered vulnerabilities, and provide risk-based recommendations to remediate those vulnerabilities. Core Requirements: Active Security Clearance Federal Contracting Experience Familiarity with working in government environments, including compliance with NIST, FISMA, and FedRAMP standards. Technical Skills: Penetration Testing Tools Vulnerability Remediation Operating Systems Expertise Deep understanding of Windows, Linux, and macOS internals. Scripting & Programming Experience with Python, PowerShell, Bash, or other scripting languages used in automation and exploit development. Network & Web Application Testing Ability to identify and exploit vulnerabilities in networks, APIs, and web applications (e.g., SQLi, XSS, CSRF). Active Directory & Cloud Environments Experience with AD enumeration and exploitation; familiarity with cloud platforms like AWS, Azure, and GCP. Certifications (Preferred): HVA Operator Certification strongly desired OSCP (Offensive Security Certified Professional) CEH (Certified Ethical Hacker) GPEN (GIAC Penetration Tester) CPT (Certified Penetration Tester)