Red Team Penetration Tester
Herndon, VA / Remote
Applications have closed
Dark Wolf Solutions
The Alphaof technology Dark Wolf Solutions operates at the nexus of mission and technology to meet our Nation's most challenging missions. JOIN THE PACK Connect Our Background About Us We combine the most innovative emerging technologies with...Dark Wolf Solutions is looking for a Red Team Penetration Tester who will plan and perform continuous cross-domain vulnerability assessments and penetration testing following the customer’s prescribed scope statement with authorities. The ideal candidate must display familiarity with cloud-based Windows and Linux operating systems and environments and be able to conduct network and application security vulnerability analysis. Specifically, the candidate will analyze mission systems to help identify potential vulnerabilities and help to provide remediation strategies to customers for these issues. The successful candidate must have prior experience with multiple facets of penetration testing, using both open source and proprietary tools. Conducts open source research on clients and their infrastructure to help identify data leakage could lead to vulnerabilities. Correlates threat data from various sources. Leverages programming knowledge to develop custom exploits for unique client systems. Travels to client sites on a semi-regular basis to conduct onsite assessments and tests. Prepares assessments and presentations of analyses and findings. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. This position is remote with up to 10% travel.
Required Qualifications:
- 6+ years’ experience in three or more specific areas to include: analysis, network engineering, networking security, penetration testing tool, red teaming, hardware engineering, software engineering, vulnerability assessment tools (OS, web, database) etc.
- BS (or equivalent) in Cyber security, Information Security, IT, EE, Network Engineering, Computer Science, or related field
- Proficiency of various operating systems: Windows, Linux
- Proficiency with cloud technology and deployments: Google Cloud Platform (GCP)
- Proficiency with at least three (3) or more of the following: mobile security, telecom protocols, operating systems, reverse engineering, forensics, network analysis, vulnerability assessment or malware.
- Working knowledge of at least one scripting or coding language
- Familiarity with container technologies to include container orchestration and microservices
- Working knowledge of software development
- Experience in network analysis methodologies
- Experience in drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis.
- Demonstrated strong written and verbal communication skills
- Clearable at least up to the Secret level
Additional Qualifications:
- Security Certification: CEH, GIAC or equivalent pen testing cert.
- Familiarity with Wireshark, Fiddler, EnCase, Sleuthkit and similar tools
- Experience employing advanced forensic tools and techniques for attack reconstruction, including dead system analysis and volatile data collection and analysis
- Desired security certification: examples include OSCP, CEH, CISSP, or Security+
- Law Enforcement/Cyber Forensics experience
- Experience in performing post-incident computer forensics without destruction of critical data.
- Experience in Malware Analysis and Reverse Engineering.
- Experience with DevSecOps, Helm, Gitlab, and K8s
- Desired experience ensuring quality assurance and the spreading of best practices
- Experience with operational communications
- MS degree in technical field
We are proud to be an EEO/AA employer Minorities/Women/Veterans/Disabled and other protected categories.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.Tags: Application security CEH CISSP Cloud Compliance Computer Science DevSecOps Exploits Forensics GCP GIAC Helm Linux Malware Microservices Mobile security Open Source OSCP Pentesting Red team Reverse engineering Scripting Vulnerabilities Windows
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Staff Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Security Analyst jobs
- Open Security Operations Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Senior Information Security Analyst jobs
- Open Product Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Principal Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Specialist jobs
- Open Security Specialist jobs
- Open Security Researcher jobs
- Open Chief Information Security Officer jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Specialist jobs
- Open IT Security Engineer jobs
- Open Clearance-related jobs
- Open ISO 27001-related jobs
- Open Windows-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open CISM-related jobs
- Open Pentesting-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open IAM-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs
- Open Malware-related jobs
- Open APIs-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open DevSecOps-related jobs
- Open CI/CD-related jobs