Job Description
Company: Peraton
Location: Arlington, US
Penetration Tester
Cyber Security
Peraton is seeking an experienced Cyber Penetration Tester to become part of Peratons’ Federal Strategic Cyber programs.
Hybrid – flex as long as person can come on-site as/when needed.
Support the Red Cell Team by performing and leading penetration tests to assess the security of customer systems.
Bachelor of Science and 5 years of relevant experience in Cyber/IT, or a Master’s of Science and 3 years of relevant experience in Cyber/IT. In lieu of a degree, 4 years of additional IT security or penetration testing experience may be considered.
Minimum of 2 years with penetration testing experience.
CCNA Cyber Ops, CCNA-Security, CEH, CFR, Cloud+, CySA+, GCIA, GCIH, GICSP, SCYBER, Security+ CE, SSCP
Demonstrated experience with Kali Linux.
Demonstrated penetration testing tools experience with Nmap, Burp Suite, Metasploit, etc.
Demonstrated ability in evaluating vulnerabilities, performing root cause analysis, and reporting findings utilizing assessment methodologies such as NIST SP 800-115, Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), OWASP Web Security Testing Guide (WTG), etc.
Demonstrated ability to lead a penetration test and guide Senior/Junior Penetration Testers.
An active Secret security clearance.
Must have the ability to obtain a final Top Secret security clearance.
Active Top Secret or TS/SCI clearance.
One of the following certifications or an alternate, verifiable certification demonstrating IT security competence:
ISC2 Certified Information Security Professional (CISSP)
ISC2 Certified Cloud Security Professional (CCSP)
ISC2 Information Systems Security Engineering Professional (ISSEP)
One of the following certifications or an alternate, verifiable certification demonstrating practical penetration testing competence:
Hack the Box Certified Penetration Testing Specialist (CPTS)
TCM Security Practical Network Penetration Tester (PNPT)
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
NIST Risk Management Framework (RMF) and the Assessment and Authorization (A&A) process.
Security principles such as CIA, IAAAA, access control models, risk management, etc.
Networking principles and technologies such as IP routing, TCP/UDP, VPNs, firewalls, NAT, etc.
Common network protocols such as SSH, FTP, SMTP, SMB, etc.
Data processing principles such as encoding, hashing, encryption, etc.
Scripting and programming languages such as Bash, Python, PowerShell, JavaScript, etc.
Common application vulnerabilities and exploits such as outdated components,
permissions mis-configurations, lack of input validation, logging/monitoring failures, etc.
Common web application vulnerabilities and exploits such as XSS, SQLi, LFI, file uploads, broken authentication mechanisms, etc.
Public Key Infrastructure (PKI) and navigating IT environments implementing multifactor authentication.
Cloud technologies and platforms such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), etc.
As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Target Salary Range
$Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual’s experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Source: Jooble