4,424 Penetration Tester jobs in the United States

Penetration Tester/Ethical Hacker

31701 Albany, Georgia RIT Solutions, Inc.

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

We are seeking a skilled Penetration Tester / Ethical Hacker to identify, exploit, and report security vulnerabilities in our digital infrastructure, applications, and systems. The ideal candidate will simulate cyberattacks to evaluate our security posture, provide actionable remediation advice, and help maintain a robust security environment across the organization.

Key Responsibilities:

  • Conduct penetration testing on applications (web, mobile, API), networks, cloud environments, and systems.
  • Simulate cyberattacks (Red Team/Blue Team exercises) to assess real-world risk.
  • Perform social engineering assessments (phishing, pretexting, etc.) if in scope.
  • Identify and document vulnerabilities using tools and manual testing methods.
  • Provide detailed reports on findings, risks, and recommended remediation steps.
  • Collaborate with developers, IT, and DevSecOps to resolve security issues.
  • Continuously research and stay up-to-date on the latest vulnerabilities, tools, and attack techniques.
  • Support compliance initiatives (e.g., PCI DSS, ISO 27001, SOC 2) by conducting relevant security assessments.
  • Participate in threat modeling and risk analysis processes.
  • Validate security fixes through re-testing.


Required Qualifications:
  • Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience).
  • 3-5 years of hands-on experience in penetration testing or ethical hacking.
  • Strong knowledge of OWASP Top 10, MITRE Telecommunication&CK, NIST, and common CVEs.
  • Experience with tools such as Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux, Nessus, etc.
  • Familiarity with scripting languages like Python, Bash, or PowerShell.
  • Experience with Windows, Linux, and cloud (AWS, Azure, GCP) environments.
  • Ability to clearly document and communicate technical findings to both technical and non-technical audiences.


Preferred Qualifications:
  • Certifications such as OSCP, CEH, GPEN, CRT, or equivalent.
  • Experience with secure code review and static/dynamic analysis tools.
  • Knowledge of secure SDLC and DevSecOps principles.
  • Red Team/Blue Team experience or adversary emulation knowledge.


Soft Skills:
  • Strong analytical and problem-solving skills.
  • Excellent communication and interpersonal skills.
  • Ethical mindset and integrity when handling sensitive systems and data.
  • Ability to work independently and within cross-functional teams.
View Now

Penetration Tester

21403 Annapolis, Maryland JASINT Consulting and Technologies, LLC

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Title: Penetration Tester

Location(s): Annapolis Junction, MD Hours: Regular Full-Time

Salary Range: $110k/yr - $175k/yr

Clearance Requirements:

This position requires a current and active TS/ SCI with FS Poly at the time of application.

What you will be doing:
  • Serve as a Subject Matter Expert providing testing expertise of the Risk Management Framework.
  • Direct and/or participate in the testing phase of security controls assessments using specialized knowledge of network protocols, operating systems, architectures, equipment, services, and standards.
  • Perform vulnerability and penetration testing using a wide variety of tools
  • Research and evaluate emerging technologies relevant to information systems security; interpret agency specific and federal security regulations
  • Perform both network and application-level testing using established testing protocols and methods
Position Requirements

Minimum Requirements:

Experience:
  • Eight (8) experience of related work experience as a Penetration Tester performing both network and application-level testing using established test protocols and methods.
Education:
  • A Bachelor's degree in Computer Science or related technical discipline from an accredited college or university
    • Four (4) years of additional experience on projects with similar software processes may be substituted for a bachelor's degree


Why JASINT ?

At JASINT, we proudly boast a "together we can" attitude. That is only possible with a strong talented team. Our goal is to answer the call to provide top mission and Warfighter support at all levels, and that's why we are seeking you!

We understand and respect the dedication and sacrifice required to serve our nation's greatest efforts, and our commitment, in turn, is to Support You!

JASINT cares about your work-life balance and offers competitive benefits to help you at every stage of your personal and professional life by providing the following: Retirement/401k with an employer match, employer-paid health, dental, vision for employees, flexible spending accounts (HSA/FSA), company partially funded HSA, STD/LTD, professional development, tuition and certification reimbursement, spot award recognition, PTO, Floating Holidays.

*** JASINT offers internal and external referral bonuses for all cleared exceptional talent we hire! Friends of yours are friends of JASINT! ***

JASINT provides equal employment opportunities to all employees and applicants without regard to race, color, ancestry, national origin, gender, sexual orientation, marital status, religion, age, disability, gender identity, genetic testing results, or service in the military. Equal employment opportunity applies to all terms and conditions of employment, including hiring, placement, promotion, termination, layoff, recall, transfer, leave of absence, compensation, and training.

JASINT participates in E-Verify and will provide the federal government with I-9 information to confirm that all new hires are authorized to work in the U.S. To learn more about E-Verify, please visit dhs.gov/e-verify.
View Now

Penetration Tester

73116 Oklahoma City, Oklahoma Invictus International

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Title: Penetration Tester

Location: Atlantic City, NJ

US Citizenship: Required

Clearance: None required; must be able to pass a Public Trust background investigation

Responsibilities:

  • Perform penetration testing to assess security posture
  • Provide a detailed analysis and identification of application, system, and network vulnerabilities, gaps in IT security guidance, and assessment of patching/mitigation methodologies
  • Act as an ethical white hat attacker (red team) to simulate cyberattacks from a malicious actor, and/or defensive cybersecurity personnel (blue team) to harden against simulated attacks
  • Develop and coordinate penetration testing Rules of Engagement, System Test Plans, and Test Reports
  • Provide recommended remediation actions to lower overall risk exposure as required
  • Offer technical expertise on penetration testing tools and simulation environment
  • Provide technical expertise supporting cybersecurity exercise development and execution, as well as tool development and deployment

Requirements:

  • Bachelor's degree in cybersecurity, computer science, information technology, engineering, math or related field
  • A minimum of 8 years of directly related experience; 2 years of the relevant experience must be within the last 3 years
  • At least one of the red or blue team certifications listed below:

  • Red team: OSCP, OSCE, OSWP, OSWE, CEH practical, ECSA practical, LPT Master, GCIH, GPEN, GWAPT, GXPN, GAWN
  • Blue team: CND, CNDA, GCIH, GCIA, GDAT, GDSA, GCED, GIAC Certified Forensic Analyst

  • US citizenship required
  • Must be able to pass a Public Trust background investigation prior to start
View Now

Penetration Tester

28245 Charlotte, North Carolina Experis

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Our client, a leader in cybersecurity solutions, is seeking a Penetration Tester to join their team. As a Penetration Tester, you will be part of the Security Department supporting various development teams. The ideal candidate will have strong analytical skills, excellent communication abilities, and a collaborative mindset which will align successfully in the organization.

Job Title: Penetration Tester

Location: Charlotte, NC - Onsite

Pay Range: Competitive

What's the Job?

  • Conduct application penetration testing for web applications and APIs to identify security defects and weaknesses using manual penetration testing skills and automated tools.
  • Configure automated tools to complete successful scanning of applications.
  • Perform defect analysis, including reviewing and validating automated scan results, and triage and disposition false positives.
  • Generate accurate and detailed technical reports with identified defects for stakeholders.
  • Collaborate with development and security teams to ensure a clear understanding of defects and remediation paths.
What's Needed?
  • Experience in application penetration testing and dynamic application security testing.
  • Proficiency in using automated security testing tools.
  • Strong understanding of web application architecture and security vulnerabilities.
  • Ability to analyze and interpret complex technical information.
  • Excellent communication skills to convey technical findings to non-technical stakeholders.
What's in it for me?
  • Opportunity to work with a dynamic and innovative team in the cybersecurity field.
  • Engage in challenging projects that enhance your skills and career growth.
  • Flexible work environment that promotes work-life balance.
  • Access to ongoing training and professional development resources.
  • Be part of a company culture that values diversity and inclusion.

If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!

About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells

ManpowerGroup® (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands - Manpower, Experis, Talent Solutions, and Jefferson Wells - creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent.
View Now

Penetration Tester

22070 Herndon, Virginia Booz Allen Hamilton

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Job Number: R0223732

Penetration Tester

Key Role:

Conduct testing and analysis to identify vulnerabilities and potential threat vectors into systems and networks, develop exploits, and engineer attack methodologies.Apply advanced advising skills, extensive technical expertise, and full industry knowledge. Develop innovative solutions to complex problems. Work without considerable direction, and mentor and supervise team members, as needed.

Basic Qualifications:

  • 5+ years of experience with cyber penetration testing or developing risk and threat mitigation plans
  • 5+ years of experience operating in Linux, Windows, and virtual platforms
  • 5+ years of experience with computer attack methods and system exploitation techniques
  • 5+ years of experience leveraging adversarial tactics to conduct hands-on security testing
  • 5+ years of experience performing network security analysis, including software or traffic analysis
  • Knowledge of tools, tactics, and techniques targeting Artificial Intelligence (AI) systems and their ecosystems
  • TS/SCI clearance with a polygraph
  • HS diploma or GED

Additional Qualifications:

  • Experience with manually auditing source code, including Java, Ruby, Python, JavaScript, Rust, or C, to find security issues
  • Bachelor's degree in CS, Information Systems, Engineering, or a relatedfield
  • Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), HTB Certified Penetration Tester Specialist (CPTS), eLearnSecurity Junior Penetration Tester (EJPT), GIAC Global Information Assurance Penetration Tester (GPEN), or GIAC Cloud Penetration Tester Certification

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance with polygraph is required.

Compensation

At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen's benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.

Salary at Booz Allen is determined by various factors, including but not limited to location, the individual's particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $86,800.00 to $198,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen's total compensation package for employees. This posting will close within 90 days from the Posting Date.

Identity Statement

As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.

Work Model
Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.

  • If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility.
  • If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role.

Commitment to Non-Discrimination

All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.

View Now

Penetration Tester

85670 Fort Huachuca, Arizona Peraton

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description



Penetration Tester

Job Locations

US-AZ-Fort Huachuca

Requisition ID

2025-153449

Position Category

Cyber Security

Clearance

Top Secret/SCI

Responsibilities

Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO - Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet and SIPRNet. The division provides defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. The division provides sensor management and event analysis and response for network and host-based events. For sensor management, the division provides management of in-line Network Intrusion Protection System/Network Intrusion Detection System (NIPS/NIDS) sensors monitoring all CONUS DoDIN-A NIPRNet and SIPRNet Enterprise traffic to detect sensor outages and activities that attempt to compromise the confidentiality, integrity, or availability of the network. In coordination with GCC Operations, DCO initiates defensive security procedures upon detection of these attacks. Event analysis and response includes the processes involved with reducing multiple cyber incidents to actual malicious threat determinations and mitigating those threats IAW guidance received from GCC Government leadership. Support the Government in providing services for CSSP services on both the NIPRNet and SIPRNet IAW Appendix E: Secure Division Workload Assessment in support of the CONUS portion of the DoDIN-A. Develop reports and products, both current and long-term, in support of CSSP and course of action development. Prepare Tactics, Techniques, and Procedures (TTP), SOPs, Executive Summary (EXSUMS), trip reports, and information/point papers. Contribute during the preparation of agreements, policy, and guidance documentation such as Memorandums of Understanding / Agreement (MOU/A), Service Level Agreements (SLA).
* Defensive Cyber Assessment (DCA) Support. The DCA Branch within the CSSP-D is responsible for conducting both local and remote penetration testing designed to emulate current threat models to the Army network to execute an assessment of the defensive security posture. Evaluate for acceptance new penetration testing TTPs (new tool usage or adversary TTP) as required for inclusion on approved penetration tools list. Maintain documentation and how-to-use guides, for all vetted penetration testing (PT) tools.
* CDAP Support. CDAP missions are conducted IAW AR 380-53, Communications Security Monitoring. The CDAP consists of three (3) mission areas: NAVs, NDAs, and Persistent Penetration Testing (PPT).
* NAV Support. Support the Government in assessing a BPCS and/or an organization's security enclave, by means of trends and analysis to prioritize NAVs. Conduct one (1) NAV per month (on average) IAW established BBP, regulations, policies, and procedures, and as requested. NAVs require travel to a remote site to execute on-site penetration testing over a one (1) week period, or longer depending on the requirements of the mission. Per AR 380-53, a NAV consists of four (4) phases:
* Phase 1: Provide/authorization (conducted from home station). * Assist in providing authorization and information about the target IS network to establish the "operating and mission parameters" or Rules of Engagement (ROE). * Execute coordination between the CDAP team and the requesting unit to identify requirements for the NAV. The CDAP team will provide a pre-brief to unit commander and support staff on details of each phase, expected outcomes, schedule, and limitations. * Provide three (3) recommended dates based off the requesting unit's proposed dates based off operations. * Identify potential team members to participate in the NAV mission.
* Phase 2: Network survey (conducted from home station). * Obtain information regarding the design and implementation of the target network and discover (scans for) information about devices on the network and its possible weaknesses. * Compare differences between design and implementation and then evaluate the network's susceptibility to intrusion/exploitation. * Retrieve results from a recent vulnerability assessment scan of the site to execute an analysis of this data to identify potential targets (systems and/or vulnerabilities) prior to arriving on site. * Develop an in-brief to be provided to the requesting unit upon arrival to go over what will be executed during the duration of the mission and validate the rules of engagement agreed upon. CDAP team members shall also prepare mission equipment, shipping containers and coordinate with logistics personnel in securing the shipping of equipment to the remote site.
* Phase 3: Network penetration testing (conducted from both home station and at remote site). This phase examines the degree and depth of information compromise obtained by potential intruders; evaluates the ability of the targeted network to detect the presence of an intruder; and acts as threat "actors" attempting to circumvent the targeted networks defenses by several means. * Utilize approved tools to execute penetration testing of the remote site by utilizing established TTPs. Penetration testing will be conducted against systems and/or devices identified within the mission planning documentation and the ROE. There may be reason to execute phishing campaigns in conjunction with the penetration testing to gain a foothold into the network. * Develop and present a final out-brief upon completion of the mission to discuss the findings of the mission, trends observed, and any recommendations/mitigation actions which need to be executed. * Secure all equipment and coordinate with shipping personnel to ensure equipment returns to home station.
* Phase 4: Final Report (conducted from home station). * Provide the requesting unit or activity an executive summary outlining impacts and recommendations for securing the target network, including detailed information on impacts, risk assessments, and recommended fixes to secure the target network or subnet. The report will also include any findings that indicate the current presence of an adversary must be reported to the GCC Government leadership immediately, with a formal write-up within two (2) hours. * Document and report any findings that could lead to a potential Category (CAT) I/CAT II IAW CJCSM 6510.01B and a Cyber Operations Readiness Assessment (CORA). * Provide final report within 30 days of the completion of the NAV as identified in Table 1: "Deliverables". Due to the sensitive dissemination control of this report, information is managed by the GCC.
* NDA Support. Although Theater Cyber Protection Teams (CPTs) execute most NDA mission, the Contractor shall provide support the Government in the execution of an NDA event. In support of NDA execution.
* Validate suspected compromises and identify the depth of intrusions to gain knowledge for use in mitigation, recovery, and future prevention of possible compromises.
* Use the results of each assessment (on going) to determine the best method of mitigation and/or continued monitoring.
* Report findings, which indicate the current presence of an adversary to Government leadership immediately, with formal, write up within two (2) hours.
* Document and report any findings that could lead to a potential CAT I/CAT II IAWCJCSM 6510.01B and a CORA.
* Provide verbal updates to the Government lead every two (2) hours that covers progress, immediate findings, and/or issues.
* Provide a formal report to the network/systems owner or the AO and the Information Systems Security Manager (ISSM) within five (5) business days of the completion of the NDA as identified in Table 1: "Deliverables". The assessment shall consist of: * Gathering host logs from compromised system(s) * Conducting on-site scans with an anomaly detection tool to determine width of cyber incident AO. * Cyber incident handling on-site for newly identified compromised systems. * Assisting on-site administrators with securing affected network(s) * Assisting cleanup * Providing daily updates on situational awareness to leadership/pertinent agencies * Preparing final NDA report * Publishing and maintaining NDA TTPs * Coordinating NDA efforts with ARCYBER and affected organizations.
* PPT Support (conducted from home station). Support the Government in the execution of approximately two (2) PPT missions per month (historically), or as required, on all supported networks, to identify potential weaknesses and network deficiencies by circumventing the defensive posture to gain access onto the network. PPT missions include high-risk web vulnerability assessments, non/limited notice penetration testing of assets, phishing assessments/campaigns, and other activity designed to identify vulnerabilities on the CONUS networks. PPTs also include open-source research of vulnerabilities, exploits, and other related activity. Prepare and provide a final report detailing the activity executed, vulnerabilities, and/or weaknesses identified during the assessment, and recommended mitigation actions to improve the defensive posture of the targeted network IAW Table 1: "Deliverables". * Execute high-risk web assessments, non-notice penetration testing of assets, on-demand testing of network devices, and other activity required to assess the defensive posture of the targeted network. * Utilize approved CDAP tools to execute these assessments and to emulate threat actors and their TTPs in gaining a foothold into the Army networks. * Review internally developed threat documents (by GCC); externally released products by higher headquarters, to include portals, tippers, tasking orders, etc.; and commercial vendor sites identifying new vulnerabilities or exploits in the wild to identify target for PPT missions. These missions result in recommendations of mitigation actions required to resolve these weaknesses and/or deficiencies.
* PPTs shall also include execution of phishing assessments/campaigns with CONUS Theater stakeholders and their subordinate commands. * Execute a phishing assessment designed to reinforce phishing awareness by emulating APT actions used by Nation-state or other adversaries to gather information or gain a foothold in the Army networks. Phishing exercises both user awareness, as well as unit/organization incident response plans to this type of threat. * Utilize authorized CDAP tools to develop phishing scenarios, malicious/non-malicious payloads for the purpose of gaining access to the remote system, and email content to lure users to click on the phishing URLs or payloads. * Ensure utilized tools collect required information needed to produce reports based on user metadata identifying who clicked on the phishing, the category of user (i.e., Department of Army Civilian, military, or Contractor), and appropriate screenshots to demonstrate successful access to remote systems. * Conduct both scheduled and limited notice phishing campaigns, as required. Phishing campaigns are normally conducted from home station; however, in some cases, may be executed at a remote site during a NAV.

Qualifications

Qualifications:

    2 years with BS/BA; 0 years with MS/MA; 6 years with no degree
  • Certifications: DCWF code 541 Intermediate: CompTIA Cloud+ or CompTIA PenTest+ or CompTIA Security+ or GIAC Certified Enterprise Defender (GCED) or GIAC Global Industrial Cyber Security Professional (GICSP)
  • Top Secret w/SCI security clearance
  • Experience in drafting written reports
  • Extensive experience in reviewing and examining data and information that supports cybersecurity assessments
  • Experience in pen testing fundamentals


Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.

Target Salary Range

$66,000 - $106,000. This represents the typical salary range for this position based on experience and other factors.

EEO

EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
View Now

Penetration Tester

28245 Charlotte, North Carolina Manpower Group Inc.

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Our client, a leader in cybersecurity solutions, is seeking a Penetration Tester to join their team. As a Penetration Tester, you will be part of the Security Department supporting various development teams. The ideal candidate will have strong analytical skills, excellent communication abilities, and a collaborative mindset which will align successfully in the organization.

Job Title: Penetration Tester

Location: Charlotte, NC - Onsite

Pay Range: Competitive

What's the Job?

  • Conduct application penetration testing for web applications and APIs to identify security defects and weaknesses using manual penetration testing skills and automated tools.

  • Configure automated tools to complete successful scanning of applications.

  • Perform defect analysis, including reviewing and validating automated scan results, and triage and disposition false positives.

  • Generate accurate and detailed technical reports with identified defects for stakeholders.

  • Collaborate with development and security teams to ensure a clear understanding of defects and remediation paths.

What's Needed?

  • Experience in application penetration testing and dynamic application security testing.

  • Proficiency in using automated security testing tools.

  • Strong understanding of web application architecture and security vulnerabilities.

  • Ability to analyze and interpret complex technical information.

  • Excellent communication skills to convey technical findings to non-technical stakeholders.

What's in it for me?

  • Opportunity to work with a dynamic and innovative team in the cybersecurity field.

  • Engage in challenging projects that enhance your skills and career growth.

  • Flexible work environment that promotes work-life balance.

  • Access to ongoing training and professional development resources.

  • Be part of a company culture that values diversity and inclusion.

If this is a role that interests you and you'd like to learn more, click apply now and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!

About ManpowerGroup, Parent Company of: Manpower, Experis, Talent Solutions, and Jefferson Wells

ManpowerGroup® (NYSE: MAN), the leading global workforce solutions company, helps organizations transform in a fast-changing world of work by sourcing, assessing, developing, and managing the talent that enables them to win. We develop innovative solutions for hundreds of thousands of organizations every year, providing them with skilled talent while finding meaningful, sustainable employment for millions of people across a wide range of industries and skills. Our expert family of brands - Manpower, Experis, Talent Solutions, and Jefferson Wells - creates substantial value for candidates and clients across more than 75 countries and territories and has done so for over 70 years. We are recognized consistently for our diversity - as a best place to work for Women, Inclusion, Equality and Disability and in 2023 ManpowerGroup was named one of the World's Most Ethical Companies for the 14th year - all confirming our position as the brand of choice for in-demand talent.

ManpowerGroup is committed to providing equal employment opportunities in a professional, high quality work environment. It is the policy of ManpowerGroup and all of its subsidiaries to recruit, train, promote, transfer, pay and take all employment actions without regard to an employee's race, color, national origin, ancestry, sex, sexual orientation, gender identity, genetic information, religion, age, disability, protected veteran status, or any other basis protected by applicable law.

View Now
Be The First To Know

About the latest Penetration tester Jobs in United States !

Penetration Tester

22021 Chantilly, Virginia VTG

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

VTG is looking for multiple levels (Level 2, 3 & 4) of a Penetration Tester in Chantilly VA. (Note: position is contingent upon program award)

A Penetration Tester (Pen Tester) is a security professional who reviews and evaluates NRO ISs and recommends changes to the Government that can improve information confidentiality, integrity, and availability. Pen Testers are also responsible for performing security focused services to improve the security posture of NRO ISs.   Travel: 25% estimate for pen testers (OCONUS travel 2x per year).
What will you do?

Pen Tester, Level 2 (Intermediate) Functional Description: In addition to being responsible for performing basic reconnaissance and vulnerability scanning in accordance with established testing methodologies; identifies common vulnerabilities that can be potentially exploited, documents and reports findings. Possess basic scripting abilities and an understanding of network fundamentals and vulnerability scanning tools. the Level 2 Pen Tester is responsible for conducting more complex penetration tests, exploring more complex vulnerability analysis including misconfigurations and zero-day exploits, and developing more sophisticated exploitation techniques. Leads penetration tests, mentoring junior testers, and providing technical guidance to stakeholders. Possess expertise in network protocols, application security, social engineering, and advanced scripting.   Pen Tester, Level 3 (Senior) Functional Description: In addition to achieved duties described in Level 2, the Pen Tester is responsible for designing and leading complex penetration tests, develops customized tools and methodologies; providing expert guidance on security best practices; identifying complex vulnerabilities, providing strategic security advice, and leading remediation efforts; collaborating with management to develop security policies, training other cybersecurity professionals, and staying abreast of emerging threats. Possess extensive knowledge of cybersecurity frameworks, industry standards, and advanced security tools.   Pen Tester, Level 4 (Subject Matter Expert) Functional Description: In addition to achieved duties described in Level 3, the Pen Tester will possess additional years of experience as described in Table A.5.5.1.   
Do you have what it takes?

Requirements: All positions require: TS/SCI with Poly   Level 2 Penetration Tester: Education: Bachelor's Degree or Higher, AND Pen Tester Experience: 3 years OR High School GED + 5 Years Relevant Experience Associates Degree + 4 Years Relevant Experience Masters or Higher + 2 Years Relevant Experience

Level 3 Penetration Tester: 

Education: Bachelor's Degree or Higher, AND Pen Tester Experience: 4 years OR High School GED + 9 Years Relevant Experience Associates Degree + 7 Years Relevant Experience Masters or Higher + 5 Years Relevant Experience

Level 4 Penetration Tester:

Education: Bachelor's Degree or Higher, AND Pen Tester Experience: 7 years OR Masters or Higher + 6 Year Relevant Experience  

All Level Certifification Requirement: Minimum Security+
Desired: DoD 8140 - CSSP Incident Responder certification:
• CyberSec First Responder (CFR)
• Cisco Cert. Network Assoc. CyberOps (CCNA CyberOps)
• CompTIA Pen Test+
• CompTIA Cybersecurity Analyst (CySA+)
• Certified Hacking Forensic Investigator (CHFI)
• CCNA Security
• GIAC Forensic Analyst (GCFA)
• GIAC Certified Incident Handler (GCIH)
• SCYBER
Level 2 Penetration Tester:
Education: Bachelor's Degree or Higher, AND
Pen Tester Experience: 3 years
OR
High School GED + 5 Years Relevant Experience
Associates Degree + 4 Years Relevant Experience
Masters or Higher + 2 Years Relevant Experience

Level 3 Penetration Tester: 
Education: Bachelor's Degree or Higher, AND
Pen Tester Experience: 4 years
OR
High School GED + 9 Years Relevant Experience
Associates Degree + 7 Years Relevant Experience
Masters or Higher + 5 Years Relevant Experience

Level 4 Penetration Tester:
Education: Bachelor's Degree or Higher, AND
Pen Tester Experience: 7 years
OR
Masters or Higher + 6 Year Relevant Experience

View Now

Penetration Tester

22021 Chantilly, Virginia VTG Defense

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

VTG is looking for multiple levels (Level 2, 3 & 4) of a Penetration Tester in Chantilly VA. (Note: position is contingent upon program award)

A Penetration Tester (Pen Tester) is a security professional who reviews and evaluates NRO ISs and recommends changes to the Government that can improve information confidentiality, integrity, and availability. Pen Testers are also responsible for performing security focused services to improve the security posture of NRO ISs. Travel: 25% estimate for pen testers (OCONUS travel 2x per year).
What will you do?

Pen Tester, Level 2 (Intermediate) Functional Description: In addition to being responsible for performing basic reconnaissance and vulnerability scanning in accordance with established testing methodologies; identifies common vulnerabilities that can be potentially exploited, documents and reports findings. Possess basic scripting abilities and an understanding of network fundamentals and vulnerability scanning tools. the Level 2 Pen Tester is responsible for conducting more complex penetration tests, exploring more complex vulnerability analysis including misconfigurations and zero-day exploits, and developing more sophisticated exploitation techniques. Leads penetration tests, mentoring junior testers, and providing technical guidance to stakeholders. Possess expertise in network protocols, application security, social engineering, and advanced scripting. Pen Tester, Level 3 (Senior) Functional Description: In addition to achieved duties described in Level 2, the Pen Tester is responsible for designing and leading complex penetration tests, develops customized tools and methodologies; providing expert guidance on security best practices; identifying complex vulnerabilities, providing strategic security advice, and leading remediation efforts; collaborating with management to develop security policies, training other cybersecurity professionals, and staying abreast of emerging threats. Possess extensive knowledge of cybersecurity frameworks, industry standards, and advanced security tools. Pen Tester, Level 4 (Subject Matter Expert) Functional Description: In addition to achieved duties described in Level 3, the Pen Tester will possess additional years of experience as described in Table A.5.5.1.
Do you have what it takes?

Requirements: All positions require: TS/SCI with Poly Level 2 Penetration Tester: Education: Bachelor's Degree or Higher, AND Pen Tester Experience: 3 years OR High School GED + 5 Years Relevant Experience Associates Degree + 4 Years Relevant Experience Masters or Higher + 2 Years Relevant Experience

Level 3 Penetration Tester:

Education: Bachelor's Degree or Higher, AND Pen Tester Experience: 4 years OR High School GED + 9 Years Relevant Experience Associates Degree + 7 Years Relevant Experience Masters or Higher + 5 Years Relevant Experience

Level 4 Penetration Tester:

Education: Bachelor's Degree or Higher, AND Pen Tester Experience: 7 years OR Masters or Higher + 6 Year Relevant Experience

All Level Certifification Requirement: Minimum Security+
Desired: DoD 8140 - CSSP Incident Responder certification:
* CyberSec First Responder (CFR)
* Cisco Cert. Network Assoc. CyberOps (CCNA CyberOps)
* CompTIA Pen Test+
* CompTIA Cybersecurity Analyst (CySA+)
* Certified Hacking Forensic Investigator (CHFI)
* CCNA Security
* GIAC Forensic Analyst (GCFA)
* GIAC Certified Incident Handler (GCIH)
* SCYBER
Level 2 Penetration Tester:
Education: Bachelor's Degree or Higher, AND
Pen Tester Experience: 3 years
OR
High School GED + 5 Years Relevant Experience
Associates Degree + 4 Years Relevant Experience
Masters or Higher + 2 Years Relevant Experience

Level 3 Penetration Tester:
Education: Bachelor's Degree or Higher, AND
Pen Tester Experience: 4 years
OR
High School GED + 9 Years Relevant Experience
Associates Degree + 7 Years Relevant Experience
Masters or Higher + 5 Years Relevant Experience

Level 4 Penetration Tester:
Education: Bachelor's Degree or Higher, AND
Pen Tester Experience: 7 years
OR
Masters or Higher + 6 Year Relevant Experience

View Now

Penetration Tester

22170 Sterling, Virginia Verite Group

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Why Choose VGI, a GRVTY Company

VGI, a GRVTY Company, started with a simple, American idea: we do things not because they are easy but because they are hard. VGI, a GRVTY Company, exists to answer challenges. We do it for customers in defense, intelligence, homeland security-anyone whose job it is to advance America's strategic position. The size of the challenge we face demands new skills, new backgrounds, and new thinking. That's what we're here to deliver. And when you work shoulder to shoulder with brilliant people tackling the most high-stakes challenges, it's invigorating. Our culture is built on collaboration, mission-focused innovation, and a commitment to excellence, where every challenge we answer opens the door to a new possibility.

The toughest national security challenges demand vision and ingenuity, not just resources. We deliver mission and technical expertise to outpace our adversaries. We're purpose-built to tackle the most entrenched, systemic national security issues around the world.

We partner with our customers to help them overcome challenges in every corner of technology and defense-including the ones still being explored. Our growing capabilities create complementary advantages, giving on-the-ground operations the edge they need to succeed. We muster everything we have to answer every challenge presented, every day of our lives.

At VGI, a GRVTY Company, we believe that when our employees thrive, our company thrives. That's why we offer a comprehensive and competitive benefits package designed to support your well-being, growth, and work-life balance.
• Robust health plan including medical, dental, and vision
• Health Savings Account with company contribution
• Annual Paid Time Off and Paid Holidays
• Paid Parental Leave
• 401k with generous company match
• Training and Development Opportunities
• Award Programs
• Variety of Company Sponsored Events

JOB DESCRIPTION AND RESPONSIBILITIES:
  • Seeking a penetration tester for a customer mission system. The successful candidate will perform vulnerability assessments and penetration testing following the customers prescribed scope statement with authorities derived from the customers Enterprise cyber security organization. The ideal candidate must display familiarity with Windows and Linux Mobile operating systems and be able to conduct network and security vulnerability analysis.
  • Specifically, the candidate will analyze mission systems to help assess vulnerability to compromise from adversaries. The successful candidate must have prior experience with scope defined penetration testing using mainly open source tools.
    Penetrate desktops, servers, applications, operating systems, and security systems to gain root/admin access
  • Provide black-box penetration testing utilizing tools and techniques to conduct cybersecurity evaluations for highly specialized network communication systems
  • Modify open source exploits to bypass/evade antivirus, firewalls, hardened systems, and IDS/IPS systems
  • Modify computer/system/network attacks, exploits, and Metasploit modules to create variations that evade detection
  • Perform reconnaissance, privilege escalation persistence, lateral movement, and payload generation for multiple targets
  • Hide digital artifacts and communications to evade antivirus, firewalls, IDS/IPS systems, Wireshark, and TCPDump
REQUIRED SKILLS AND QUALIFICATIONS:
  • 3-5 years of exploit development, computer/network security, or network traffic analysis using analytical tools
  • Experience with Kali Linux and Metasploit tools
  • Experience with programming/scripting: Python, PowerShell , Ruby, C, JavaScript, etc.
  • DESIRED SKILLS AND QUALIFICATIONS:
  • Degree in Computer Science, Engineering, Computer Forensics, Network Security, or equivalent technical experience
  • Expert knowledge of networking components/devices and various OS/applications in Linux and Windows environments
  • At least one of the following certifications: CISSP, OSCP, CEH, CEPT, GPEN, EnCE, GASF, GSFE
  • Demonstrated experience in three or more specific areas to include: analysis, network engineering, networking security, penetration testing, red teaming, hardware engineering, software reverse engineering, and computer exploitation.
Education
  • Bachelor's degree (or equivalent) in Cybersecurity, Information Security, IT, EE, Network Engineering, Computer Science, or related field

Clearance- TS or TS/SCI

WORK LOCATION : Dulles, VA

TRAVEL : 0%

KEY WORDS: GPEN, OSCP

VGI, a GRVTY Company, is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran and will not be discriminated against on the basis of disability.

Anyone requiring reasonable accommodations should email with requested details. A member of the HR team will respond to your request within 2 business days. Please review our current job openings and apply for the positions you believe may be a fit. If you are not an immediate fit, we will also keep your resume in our database for future opportunities.
View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Penetration Tester Jobs