Senior Cloud Penetration Tester

Arlington, Virginia

Applications have closed

Two Six Technologies is seeking a Senior Cloud Penetration Tester to take a leading role in delivering highly technical cybersecurity services to our commercial customers. This role involves delivering complex and highly technical security results to customers ranging from startups to Fortune 50s. This role will allow for autonomy in running one’s own projects, creating new methods, techniques, and tools. There will be interface with customers and strong collaboration with other members of a highly competent technical team.

Responsibilities Include:
Take on complex technical problems for which there is often no known answer.
Deconstruct and understand complex telecommunications and other networked systems; perform in-depth analysis to find vulnerabilities, understand their impact, and communicate this to technical audiences.
Collaborate with other reverse engineers, hardware experts, and others to deliver projects which meet client expectations and needs.
Assist in information gathering and results read-outs with customers.
Seek ways to improve team effectiveness through new tools, techniques, and processes.


Minimum Qualifications:

  • Bachelor’s (or higher) degree in computer science, engineering, or a related field (strong demonstrated expertise in web and cloud exploitation can be substituted for this requirement) 
    Strong familiarity with cybersecurity principles
  • Minimum of 3 years of programming/scripting languages (e.g., Go, Rust, Python, or similar) and comfort at the command line (Powershell or your favorite flavor of *nix shell)
    Demonstrated experience with intercepting proxies for introspection into web communications (http, websockets, etc)
  • Minimum of 3 years experience in the use and assessment of orchestrated containerized services (Docker Swarm, Kubernetes, Nomad, or OpenStack).
  • Minimum of 3 years experience performing penetration testing focused on cloud networks (AWS/Azure/GCP) and web applications.


Nice If You Have:

  • Experience with implementing mobile network services or evaluating mobile telecommunications networks and services.
  • Familiarity with embedded systems and hardware security testing
  • Experience in telecommunications and critical infrastructure

Two Six Technologies is an Equal Opportunity Employer.  All qualified applicants will receive consideration for employment at Two Six Technologies without regard to race, color, religion,  national origin, sex, age, physical and mental disability, sexual orientation, gender identity or expression, genetic information, veteran, marital, pregnancy or citizenship status; or any other status prohibited by applicable national, federal, state or local law.

Two Six Technologies Covid-19 Vaccination Policy requires employees to be fully vaccinated. Exceptions to this policy are only granted to those with a company-approved medical or religious accommodation.  Prospective or new employees will be required to adhere to this policy and submit proof of vaccination or have an approved exemption prior to the start of their employment.   

If you are interested in applying for employment with Two Six Technologies and require an accommodation, please contact Human Resources at Two Six Technologies by sending an email to hr@twosixtech.com.  Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: AWS Azure Cloud Computer Science Docker GCP Kubernetes OpenStack Pentesting PowerShell Python Rust Scripting Vulnerabilities

Region: North America
Country: United States
Job stats:  7  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.