Incident Responder (IR) and Penetration Tester (PenTester) / Threat Hunter
Job Posting Title: Penetration Tester (PenTester) / Threat Hunter
Worksite Location: Seaside, CA
Required Education, Experience
Bachelor’s degree in computer science, computer forensics, cybersecurity, information security, or similar technical discipline AND 4+ years of cybersecurity experience, preferably in support of the DoD or other federal clients
For the exceptional candidate, an additional 4 years of military or civilian professional cybersecurity experience will be considered in lieu of a Bachelor’s degree
Active Certified Ethical Hacker (CEH) certification
Required Qualifications:
Extensive experience performing white- and gray-box penetration testing against desktop machines, physical and virtualized servers, network infrastructure, cloud infrastructure, mobile devices, and web-based applications
Ability to author comprehensive penetration testing plans, to defend plans to and gain consensus from upper management, to precisely follow test guidelines, and to document all penetration testing findings, deviations, lessons learned, and other information
Ability to communicate effectively with government and contract leadership, while conveying highly technical concepts to both technical and nontechnical stakeholders
Capacity to thrive in a complex, chaotic environment with competing demands while delivering consistent, high-quality commitment to mission-critical systems and solutions
Excellent analytic skills, including qualitative and quantitative data analysis to support and defend data-driven decision-making regarding system threats, vulnerabilities, and risk
Knowledge of DoD cybersecurity policies, practices, and requirements, specifically including NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)
Experience supporting vulnerability management and patch management through the use of penetration testing to validate vulnerabilities and their subsequent remediation
Willing to work overtime, holidays, and weekends as necessary to support cybersecurity initiatives and incident response
Desired Qualifications:
Development experience in languages such as C/C++, Java, Python, and Ruby, as well as experience in command line scripting languages such as Bash and PowerShell
One or more penetration testing certifications, including: LPT, PenTest+, GPEN, GWAPT, GXPN, or OSCP
Systems architecture, engineering, and networking experience, with preferred certifications such as SSCP, Network+, CCNA, CCNP, CCIE, GISF, GCED, GPPA, or GDSA
Experience in threat, vulnerability, and risk management and mitigation, with preferred certifications such as CySA+, GEVA, GCTI, GMON, CRISC, or CISA
Experience supporting all aspects of diverse endpoint systems, with preferred certifications such as Linux+, Server+, GCWN, GCUX, MCSA, MCSE, or SCCM
Knowledge of and experience administering, optimizing, and securing cloud environments, with preferred certifications such as Cloud+, CCSP, AWS Certified Security, AWS Certified Advanced Networking, Oracle Cloud Infrastructure Certified Associate, or Oracle Cloud Infrastructure Certified Architect Professional
Database security management with experience detecting and preventing SQL injection and other threats, and preferred certifications such as the Oracle Database Security Expert
Experience utilizing DoD tools, including the Assured Compliance Assessment Solution (ACAS) vulnerability scanner, host-based security system (HBSS), and McAfee ePolicy Orchestrator (ePO)
Experience sandboxing and reverse engineering malicious payloads
Past participation in capture the flag (CTF) and other offensive cybersecurity competitions (e.g., DEF CON, BSides, FAUST CTF, GoogleCTF)
Experience leveraging the Metasploit Framework to identify and exploit vulnerabilities