Cloud Security Penetration Tester

U.S. Remote

Applications have closed

Bishop Fox

Bishop Fox, the leader in offensive security, continuous pen testing, red teaming, attack surface management, and traditional security assessments.

View company page

Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. We’ve worked with more than a quarter of the Fortune 100, half of the Fortune 10, eight of the top 10 global technology companies, and all of the top global media companies. Our Cosmos platform was named Best Emerging Technology in the 2021 SC Media Awards and our offerings are consistently ranked as “world class” in customer experience surveys. For more than 16 years, we've been contributing and giving back to the security community. We’ve published more than 16 open source tools and 50 security advisories in the last five years alone. Learn more at bishopfox.com or follow us on Twitter.  

Given our exceptional growth, we are expanding and hiring a  Cloud Security Penetration Tester to join us on this exciting journey. You are a born penetration tester; you see problems -and solutions- in everything. You are not simply happy that your exploit worked, you want to know why it worked.  You’ve plundered apps and pillaged networks (legally, of course), and you want to apply that offensive mindset to modern infrastructure. Or, maybe you are a cloud security practitioner who is looking to switch from defensive security to offensive security. You’ve already put time into CTFs and other hacking challenges, and you are ready to make the switch to offense. In either case, we want to talk with you! 

 

Responsibilities 

With Bishop Fox, your responsibilities would include objective based penetration testing against cloud infrastructure, Kubernetes clusters, traditional network infrastructure, and sometimes the links between these environments.  Some days, you’ll be testing a client’s multi-account AWS environment and trying to escalate from a developer in the development AWS account to administrative access in the production AWS account; other days, you’ll be starting from a compromised application scenario and trying to gain unintended access to sensitive data. Every day at Bishop Fox, you’ll be learning. 

As a consultant, you’ll work on a variety of projects which include short-term engagements and extended program work with well-established clients, you'll solve challenging technical problems and build creative solutions. As a trusted advisor, you’ll provide your expert opinion to help our clients navigate difficult business decisions.                                                        

 

Requirements 

  • Penetration testing and network security skills. 
  • Vulnerability assessment experience. 
  • Experience operating in at least one major cloud provider’s (AWS, GCP, Azure) ecosystem, or with Kubernetes.  
  • Experience with objective based penetration testing (e.g., internal penetration testing), where you are given a specific starting position and the purpose of the assessment is to accomplish as many of the objectives as you can, in as many ways as possible, in the time allotted. 
  • Experience reading and understanding IAM policies, and how IAM relates to the principal of least privilege.
  • Understanding of security fundamentals and common application vulnerabilities (e.g., OWASP Top Ten) in addition to more modern web app and enterprise app vulnerabilities.
  • 2+ years of either network-focused offensive security experience in supporting a variety of engagements with clients from a variety of industries, or as a cloud security practitioner.  
  • Additional experience in IT, security engineering, system and network security, authentication and security protocols, and/or applied cryptography.
  • Network and web-related protocol knowledge (e.g., TCP/IP, UP, IPSEC, HTTP, HTTPS, routing protocols).
  • Experience with Kubernetes security (RBAC, privesc, etc.) is helpful, but not a necessity.
  • Experience with Infrastructure as code, GitOps, and CI/CD tooling and processes are helpful, but not a necessity.
  • Scripting/programming skills (Go, Python, JavaScript, etc.) are helpful, but not a necessity.
  • OSCP/E, GPEN, and any cloud security certifications are helpful, but not a necessity.
  • Advanced relevant academic training is a definite bonus, i.e., Bachelor’s in Computer Science. 

 

Interested? Apply today!             

 

Bishop Fox has always allowed its employees to work remotely, and this role could work anywhere in the United States. Equity is offered to all employees and starts vesting on the first day.  You also have the opportunity to earn additional equity.  Our comprehensive benefits program is tailored to meet your needs at an affordable price. We embrace diversity and an inclusive culture.  We value our employees and who they are, which fosters a powerful and collective talent base to successfully serve our clients and the security community with unparalleled expertise.   

Bishop Fox is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected veteran status, or any other characteristic protected by applicable federal, state, or local law.  All new hires must pass a background check as a condition of employment. 

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security AWS Azure CI/CD Cloud Computer Science Cryptography Exploit GCP GPEN IAM JavaScript Kubernetes Network security Offensive security Open Source OSCP OWASP Pentesting Python Scripting Security assessment TCP/IP Vulnerabilities

Perks/benefits: Career development Salary bonus

Regions: Remote/Anywhere North America
Country: United States
Job stats:  27  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.