Penetration Testing Engineer

Overview

On Site
0 to 0
Full Time
No Travel Required

Skills

Python
PowerShell
Bash
Windows
Linux
Unix
Certified Ethical Hacker
Microsoft 365
Microsoft Azure

Job Details

Description:

Business Operational Concepts (BOC) is a recognized leader in providing Technical and Program Management Services, Information Technology, and Support.

BOC has enabled their Government and Commercial clients to achieve their organizational initiatives through the application of high quality, innovative, and cost-effective professional services and solutions. We provide a positive working environment, with opportunities for advancement in our growing Federal sector workforce.

We offer an excellent compensation package which includes a generous salary, insurance (medical, dental, etc.), paid leave, 401k plan and more. We are committed to the diversity we bring to the marketplace and believe customer satisfaction comes first.

JOB SUMMARY:

Business Operational Concepts (BOC) is currently seeking a Penetration Testing Engineer to work with our federal client. The ideal candidate for this job will serve as a penetration tester on the federal agency clients in-house penetration testing team within the clients Cyber Division Cyber Integration Center. A highly motivated individual with strong technical, communication, and organizational skills will succeed on this program.

DUTIES AND RESPONSIBILITIES:

* Support federal clients enterprise penetration testing program to test all facets of clients IT infrastructure for exploitable weaknesses on a continuous basis.

* Conduct system-specific penetration tests on each of the federal clients numerous FISMA systems every two years, with designated high-value asset (HVA) systems and FIPS 199 High systems being tested every year.

* Operate enterprise-grade and open-source penetration testing software, including:

* BloodHound AD

* Burp Suite Pro

* Cobalt Strike

* Kali Linux tool suite

* Other tools as applicable

* Develop custom proof of concept exploit code/scripts to illustrate exploitable vulnerabilities.

* Mimic attacks of threat actors defined by the Cyber Threat Intelligence (CTI) Team to assess and improve IT system resilience, EOC monitoring effectiveness and tuning of security tools within the federal clients environment.

* Perform ad hoc, focused pen tests to validate effectiveness of corrective actions taken to address identified weaknesses.

* Red Team Testing to emulate the actions and tactics of an Advanced Persistent Threat (APT) actor to gain access to an organization and attempt to reach the targets identified.

* Conduct Purple Team adversary simulation exercises at least 6 times per year to help SOC staff practice recognizing and responding to APT-style TTPs, such as encrypted C2 communication, anti-virus evasion, and covert channel data exfiltration.

* Phishing Assessments to measure the awareness of an organization and reinforce key learning objectives.

* Compete as part of a team in various regional and virtual CTF competitions (BSides, ShmooCon, etc.)

* Learn from other specialist security engineers to be able to assist with advanced incident response activities.

* Under the direction of Federal leadership penetration testing services includes but not limited to:

* Circumventing authentication and authorization mechanisms

* Escalate Application user privileges

* Hijack accounts belonging to other users

* Violate access controls placed by the site administrator

* Alter data or data presentation.

* Corrupt Application and data integrity, functionality and performance.

* Circumvent Application business logic.

* Circumvent Application session management.

* Break or analyze use of cryptography within user accessible components.

* Determine possible extent of access or impact to the federal clients systems by attempting to exploit vulnerabilities under the direction of the federal client.

* Exploit web applications and Application Programming Interfaces (APIs) during the API lifecycle.

* Source Code Analysis identifying any vulnerabilities or weaknesses within the software.

* Test database applications or stored functions, database systems, database servers and associated network links that validate the database security and verifies the adversaries are not able to exploit vulnerabilities in the database to access or modify the data.

* Network Services Testing conducted locally or remotely identifying security weaknesses and vulnerabilities in the network infrastructure.



Requirements:

QUALIFICATIONS:

Required (Minimum) Qualifications Education, Certification, Experience, and Skills

* Hands-on-keyboard penetration testing experience. (Running nmap and Nessus scans doesnt count must have experience actually exploiting target assets/popping shells, even if only in a lab environment.)

* Proficiency with common open-source penetration testing tools such as the Kali Linux tool suite, i.e. Metasploit Framework, SQLmap, Burp Suite.

* Understanding of common exploitation techniques such as SQL injection, XSS, pass-the-hash, etc.

* Ability to craft custom exploits to provide proof of concept vulnerability validation.

* Proficient scripting skills in Python, PowerShell, and/or Bash.

* In-depth knowledge of common enterprise operating systems: Windows, Linux/Unix

* Ability to work well in a team environment.

* Exceptional critical thinking and analytical skills candidate must have the ability to fully learn and understand security measures and devise creative mechanisms to defeat them.

* Ability to calculate and assess risk based on threats, vulnerabilities, and mitigating factors.

* Self-starter with ability to work with little supervision.

* The ability to rapidly shift priorities efficiently is a necessary skill for this position.

* Ability to clearly and concisely document vulnerability findings in written format for both technical and non-technical audiences.

* Ability to speak publicly within the organization at meetings with up to 100 participants.

* Willingness to take on and adapt to new, open-ended tasks for which there is no current standard operating procedure.

* Ability to research independently and self-teach.

Preferred Qualifications Education, Certification, Experience, Skills, Knowledge, and Abilities

* Interest in security/hacking culture. Ability to think like an attacker

* Certifications (one or more of the following preferred):

* OSCP strongly preferred, required within 6 months of hire (company-paid).

* Certified Ethical Hacker (CEH)

* GIAC Certified Penetration Tester (GPEN)

* Familiarity with the Microsoft 365 and Microsoft Azure suite of products, including Microsoft Sentinel and Microsoft 365 Defender.

* Familiarity with non-Windows operating systems, i.e. Cisco IOS, Mac OSX, Android, Apple iOS, IBM Z/OS.

* Familiarity with NIST SP 800-53 security controls.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.