10 Penetration Testing jobs in Washington
Manager, Cyber Penetration Testing
Posted 9 days ago
Job Viewed
Job Description
Known for being a great place to work and build a career, KPMG provides audit, tax and advisory services for organizations in today's most important industries. Our growth is driven by delivering real results for our clients. It's also enabled by our culture, which encourages individual development, embraces an inclusive environment, rewards innovative excellence and supports our communities. With qualities like those, it's no wonder we're consistently ranked among the best companies to work for by Fortune Magazine, Consulting Magazine, Seramount, Fair360 and others. If you're as passionate about your future as we are, join our team.
KPMG is currently seeking a Manager, Cyber Penetration Tester to join our Enterprise Security Services organization. This is a remote work opportunity.
Responsibilities:- Conduct detailed network, and web application penetration tests
- Perform red teaming exercises to assess the detection capabilities of our security operations
- Engage in Artificial Intelligence (AI) Red Teaming to improve the robustness and security of AI systems
- Facilitate security assessments, and manage the resolution of identified vulnerabilities
- Stay current with the latest security trends, and techniques
- Provide guidance and mentoring to junior team members
- Minimum five years of recent practical experience in cybersecurity, focusing on network and web application penetration testing, red teaming, AI red teaming, cloud penetration testing, and security assessments
- Bachelor's degree from an accredited college or university is preferred; relevant certifications such as GIAC Penetration Tester (GPEN), Offensive Security Certified Professional (OSCP), Offensive Security Certified Expert (OSCE), Certified Information Systems Security Professional (CISSP), or similar are highly preferred; Certifications in Azure is preferred
- Experience with common and emerging security threats, scanning tools, and assessment methodologies and demonstrated experience and understanding of security principles, IT security controls and related technologies and products; solid foundation in network and cloud security concepts, with practical experience in cloud penetration testing, and strong understanding of network penetration testing MITRE Adversarial Threat Landscape for Artificial-Intelligence Systems (MITRE ATLAS) , Open Worldwide Application Security Project (OWASP), Penetration Testing Execution Standard (PTES), and National Institute of Standards and Technology (NIST)
- Proficiency in scripting and automation with experience in Python, Bash, or PowerShell; background with adversarial machine learning techniques, as well as familiarity with common ML frameworks and tools such as prompt injection, data poisoning, and model evasion
- Strong verbal/written communication, problem solving, analytical and independent judgment skills to support an environment driven by customer service and teamwork
- Must be authorized to work in the U.S. without the need for employment-based visa sponsorship now or in the future. KPMG LLP will not sponsor applicants for U.S. work visa status for this opportunity (no sponsorship is available for H-1B, L-1, TN, O-1, E-3, H-1B1, F-1, J-1, OPT, CPT or any other employment-based visa)
KPMG complies with all local/state regulations regarding displaying salary ranges. If required, the ranges displayed below or via the URL below are specifically for those potential hires who will work in the location(s) listed. Any offered salary is determined based on relevant factors such as applicant's skills, job responsibilities, prior relevant experience, certain degrees and certifications and market considerations. In addition, the firm is proud to offer a comprehensive, competitive benefits package, with options designed to help you make the best decisions for yourself, your family, and your lifestyle. Available benefits are based on eligibility. Our Total Rewards package includes a variety of medical and dental plans, vision coverage, disability and life insurance, 401(k) plans, and a robust suite of personal well-being benefits to support your mental health. Depending on job classification, standard work hours, and years of service, KPMG provides Personal Time Off per fiscal year. Additionally, each year the firm publishes a calendar of holidays to be observed during the year and provides two firmwide breaks each year where employees will not be required to use Personal Time Off; one is at year end and the other is around the July 4th holiday. Additional details about our benefits can be found towards the bottom of our KPMG US Careers site at "Benefits & How We Work".
Follow this link to obtain salary ranges by city outside of CA:
California Salary Range: $115600 - $246900
KPMG LLP (the U.S. member firm of KPMG International) offers a comprehensive compensation and benefits package. KPMG is an equal opportunity employer. KPMG complies with all applicable federal, state and local laws regarding recruitment and hiring. All qualified applicants are considered for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, citizenship status, disability, protected veteran status, or any other category protected by applicable federal, state or local laws. The attached link contains further information regarding the firm's compliance with federal, state and local recruitment and hiring laws. No phone calls or agencies please.
KPMG does not currently require partners or employees to be fully vaccinated or test negative for COVID-19 in order to go to KPMG offices, client sites or KPMG events, except when mandated by federal, state or local law. In some circumstances, clients also may require proof of vaccination or testing (e.g., to go to the client site).
KPMG recruits on a rolling basis. Candidates are considered as they apply, until the opportunity is filled. Candidates are encouraged to apply expeditiously to any role(s) for which they are qualified that is also of interest to them.
Los Angeles County applicants: Material job duties for this position are listed above. Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed above, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, and safeguard business operations and company reputation. Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, Fair Chance Initiative for Hiring Ordinance, and San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
Vulnerability Assessment Analyst
Posted 8 days ago
Job Viewed
Job Description
CALIBRE is an employee-owned mission focused solutions and digital transformation company. We are currently seeking a Vulnerability Assessment Analyst to support work we are doing in Springfield, VA. This position will be on site. This position performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Additional duties:
• Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
• Conduct and/or support authorized penetration testing on enterprise network assets.
• Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
• Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
• Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
• Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews (TSCM), TEMPEST countermeasure reviews).
• Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network UNCLASSIFIED 96 UNCLASSIFIED and infrastructure, enclave boundary, supporting infrastructure, and applications).
• Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).
Required Skills
• Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
• Skill in assessing the robustness of security systems and designs.
• Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
• Skill in mimicking threat behaviors.
• Skill in the use of penetration testing tools and techniques.
• Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.).
• Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).
• Skill in reviewing logs to identify evidence of past intrusions.
• Skill in conducting application vulnerability assessments.
• Skill in performing impact/risk assessments.
• Skill to develop insights about the context of an organization's threat environment
• Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
• Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.
• Ability to apply programming language structures (e.g., source code review) and logic.
• Ability to share meaningful insights about the context of an organization's threat environment that improve its risk management posture.
• Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Required Experience
• Knowledge of computer networking concepts and protocols, and network security methodologies.
• Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
• Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
• Knowledge of cybersecurity and privacy principles.
• Knowledge of cyber threats and vulnerabilities.
• Knowledge of specific operational impacts of cybersecurity lapses.
• Knowledge of application vulnerabilities.
• Knowledge of cryptography and cryptographic key management concepts
• Knowledge of data backup and recovery.
• Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
• Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
• Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
• Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP) and Internet Protocol (IP), Open System Interconnection Model (OSI), Information Technology Infrastructure Library, current version (ITIL)).
• Knowledge of programming language structures and logic.
• Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language (PL/SQL) and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
• Knowledge of systems diagnostic tools and fault identification techniques.
• Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
• Knowledge of interpreted and compiled computer languages.
• Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
• Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
• Knowledge of system administration, network, and operating system hardening techniques.
• Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). K0179: Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
• Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
• Knowledge of ethical hacking principles and techniques. K0210: Knowledge of data backup and restoration concepts.
• Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
• Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability.
• Knowledge of an organization's information classification program and procedures for information compromise.
• Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
• Knowledge of cryptology.
• Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. K0342: Knowledge of penetration testing principles, tools, and techniques.
• Knowledge of an organization's threat environment.
• Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)
Must haves:
• Current/Active TS/SCI security clearance
• 4+ years experience
• IAT Level 2 Certification (Comp TIA Security+ or CCNA or CISSP
• Two Penetration Testing Certifications (e.g., GPEN, GWAT, GCIH, CEH, GPYC, LPT, CPT)
Vulnerability Assessment Analyst III
Posted 3 days ago
Job Viewed
Job Description
At Agile Defense we know that action defines the outcome and new challenges require new solutions. Thats why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agilityleveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nations vital interests.
Requisition #:
Job Title: Vulnerability Assessment Analyst III|Exempt
Job Title for Careers Page: Senior Tenable Security Engineer
Location: 14th and C Streets, SW Washington D.C., District of Columbia 20228 AND/OR 9000 Blue Mound Road, Fort Worth, TX 76131
Clearance Level: Active DoD -
Required Certification(s):
Tenable Vulnerability Management, Tenable Security Center, or Tenable OT Security certification is required.
CISSP or equivalent is required
SUMMARY: The Bureau of Engraving and Printings (BEP's) core mission is to design and manufacture high-quality security documents that meet customers' requirements for quality, quantity, and performance, as well as counterfeit deterrence. This position will serve as the Subject Matter Expert leading the development, improvement, integration, deployment, and ongoing maintenance of BEPs Vulnerability Management solution.
JOB DUTIES AND RESPONSIBILITIES
Design, develop, and customize Tenable security solutions to align with organizational security requirements and compliance needs.
Create and optimize vulnerability scanning policies, configurations, and dashboards to ensure comprehensive coverage of assets.
Continuously assess and enhance the effectiveness of Tenable tools by analyzing scan results, identifying gaps, and recommending improvements.
Update and refine scanning templates, asset groups, and vulnerability prioritization to reduce false positives and improve accuracy.
Stay updated on emerging threats, vulnerabilities, and Tenable product updates to incorporate best practices and new features.
Integrate Tenable solutions with other security tools and platforms, such as SIEM (e.g., Splunk, QRadar), ticketing systems (e.g., ServiceNow), and endpoint detection tools, to create a cohesive security ecosystem.
Plan and execute the deployment of Tenable solutions across multiple environments, ensuring minimal disruption to operations.
Monitor and maintain Tenable systems to ensure optimal performance, availability, and accuracy of vulnerability data.
Perform regular updates, patches, and upgrades to Tenable tools to address new vulnerabilities and maintain compliance.
Serve as the primary point of contact for Tenable-related queries, providing guidance to security teams, IT staff, and leadership.
Generate and present detailed vulnerability reports, metrics, and risk assessments to technical and non-technical audiences.
QUALIFICATIONS
Required Certifications
Tenable Vulnerability Management, Tenable Security Center, or Tenable OT Security certification is required.
CISSP or equivalent is required
Education, Background, and Years of Experience
Bachelors degree in Computer Science, IT, Business, Management, or related discipline from an accredited institution.
10 or more years experience in Bachelor's degree discipline. 8 or more years of experience with Tenable engineering and implementation.
ADDITIONAL SKILLS & QUALIFICATIONS
Required Skills
Experience with the administration of information systems.
Experience managing and leading technical projects.
Experience working in a cybersecurity program.
WORKING CONDITIONS
Environmental Conditions
Standard office building working within a cube and near co-workers.
Strength Demands
Sedentary 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
Physical Requirements
Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
#J-18808-LjbffrVulnerability Assessment Solutions Administrator
Posted 9 days ago
Job Viewed
Job Description
Description
The Leidos Digital Modernization group is looking for a Vulnerability Assessment Solutions Administrator . This exciting role focuses on managing and optimizing the ACAS (Assured Compliance Assessment Solution) system, a vital tool for vulnerability assessment and security auditing, particularly within the Department of Defense. You will ensure the system operates at its best, analyze scan results, and collaborate with various teams to address identified vulnerabilities.
If you thrive in a dynamic environment and want to make a significant impact, read on!
Leidos Digital Modernization Sector is dedicated to delivering enterprise IT, digital modernization, and cyber capabilities to meet essential operational and mission objectives for the Air Force, Space Force, and Defense Agencies.
Position Responsibilities:
Proactively mitigate information risk by ensuring proper security, monitoring, and operation of Security Center servers and logs across NIPRNet and SIPRNet environments.
Identify and secure ECAS Scanner servers and maintain operations within the CONUS theater.
Conduct ACAS Agent scans and differential scans adhering to DISA best practices.
Collaborate with subscriber sites to facilitate the Cyber Operational Readiness Assessment (CORA) process.
Ensure the integrity of the operating system environment, focusing on SecurityCenters and Nessus scanners.
Report compliance data to senior management in response to directives and taskings.
Maintain effective communication with IT administration teams supporting both Cloud and on-premise server infrastructure.
Associate Nessus scanners with the correct scan zones and repositories to enhance efficiency.
Provide multi-tiered ACAS administrator support to various stakeholders.
Troubleshoot application errors, operating systems, server hardware, network communications, and storage issues within the ACAS environment.
Utilize diagnostic tools and logs to identify and resolve technical problems swiftly.
Employ the Atlassian Suite to track issues impacting system operations and suggest corrective actions.
Review system logs to identify scanning problems and recommend effective corrective measures.
Continuously evaluate current ACAS implementations for scans, assets, analyses, and permissions.
Assist in installing and maintaining configuration files, custom scan policies, plug-ins, and DISA STIGs to enhance vulnerability discovery capabilities.
Plan, document, and coordinate the implementation of updated processes and best practices for ACAS operations and maintenance.
Basic Qualifications:
Bachelor's degree with 8+ years of relevant experience, with consideration for extensive experience in lieu of a degree.
Possess one professional certification as outlined in DISA IASE IAT Level II DoD 8570.01 Approved Baseline and one Cyber Security Service Provider baseline certification before employment.
DISA ACAS certification is required.
Familiarity with the Cyber Operational Readiness Assessment (CORA) process is preferred.
Knowledge of VPN and Active Directory functionality.
Excellent communication skills, both written and verbal, with strong team collaboration abilities.
Understanding of imaging processes for PCs and Laptops, and basic authentication and IP CIDR setups.
Ability to work effectively within a dynamic cross-organizational team.
U.S. Citizenship is required, along with an active Secret clearance.
Strong troubleshooting skills for diagnosing and managing desktop software and hardware issues.
Ready to break things (in a good way) and build them smarter? Join us at Leidos!
Original Posting: August 8, 2025
For U.S. Positions: This job requisition will remain open for at least 3 days, closing no sooner than 3 days after the original posting date.
Pay Range:
Pay Range $104,650.00 - $189,175.00
This pay range serves as a guideline only and does not guarantee compensation. Additional factors include job responsibilities, education, experience, skills, internal equity, and applicable laws.
VULNERABILITY ASSESSMENT ANALYST-INTERMEDIATE (CYBER)
Posted 5 days ago
Job Viewed
Job Description
Overview:
Quantum Research International, Inc. (Quantum ) is a certified DoD Contractor providing services and products to US/Alliedgovernments and industry in the following main areas: (1) Cybersecurity, High Performance Computing Systems, Cloud Services and Systems; (2) Space and Ground Support Systems; (3) Aviation Systems; (4) Missile Systems; (5) Artificial Intelligence/ Machine Learning Systems and Experimentation/Training; and (6) Audio Visual Systems and Services. Quantum's Corporate Office is in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation's Warfighters. In addition to our corporate office, we have physical locations in Aberdeen; MD; Colorado Springs, CO; Orlando, FL; Crestview, FL; Madison, AL, and Tupelo, MS.
Mission: s a member of the National Geospatial-Intelligence Agency (NGA) DEFENDER Computer Network Exploitation (CNE) team, the contractor executes computer network operations via penetration testing and emulating Advanced Adversaries, Insider Threats, and Purple Team against NGA systems for the purpose of strengthening information system security. Cyber Vulnerability Assessment Analysts will help develop and execute plans leveraging multiple cyber threat Tactics, Techniques and Procedures (TTP's) to breach and/or exfiltrate data in such a way as to minimize the risk of detection by a Security Operations Center (SOC). The positions also require the ability to protect data successfully exfiltrated from a targeted network and to provide mitigations to its exploits or observations that are resource-realistic, systemic, and actionable to buy down risk. This position is available immediately and supports the NGA onsite (no remote or hybrid) at NGA headquarters in Springfield, VA
Responsibilities:
- Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
- Conduct and/or support authorized penetration testing on enterprise network assets.
- Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
- Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
- Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
- Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews (TSCM), TEMPEST countermeasure reviews).
- Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).
- Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).
Requirements:
- TS/SCI clearance, subject to CI Polygraph.
- IAT Level 2 and Two Penetration Testing certifications (OSCP, GPEN, GWAT, GCIH, CEH, CEH Master, GPYC, LPT, CPT, etc)
- DoD 8570 IAT II certification
- Bachelor's degree. In lieu of degree, Sec+, GICSP, Cloud+, GCED, PenTest+, or GSEC may be accepted.
- Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
- Skill in assessing the robustness of security systems and designs.
- Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
- Skill in mimicking threat behaviors.
- Skill in the use of penetration testing tools and techniques.
- Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.).
- Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).
- Skill in reviewing logs to identify evidence of past intrusions.
- Skill in conducting application vulnerability assessments.
- Skill in performing impact/risk assessments.
- Skill to develop insights about the context of an organization's threat environment
- Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Desired/Preferred Skills:
- Experience with cloud technologies.
#LI-Onsite #LI-JL1
Equal Opportunity Employer/Affirmative Action Employer M/F/D/V:
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, veteran status, genetic information, sexual orientation, gender identity, or any other characteristic protected by law. *Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
#J-18808-LjbffrTS/SCI Vulnerability Assessment Analyst
Posted today
Job Viewed
Job Description
Insight Global is looking for a TS/SCI Vulnerability Assessment Analyst in the Springfield, VA area. They will be supporting a customers cyber security team doing both technical and non technical risk and vulnerability assessments across systems, networks, and applications. They will conduct and support penetration testing on enterprise network assets. They will also monitor and interpret threat environments to inform risk strategies.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: and Requirements
TS/SCI
Bachelors Degree / or Prior Military experience
IAM or IAT ll certification
2 Penetration Testing Certifications (GPEN, GWAT, GCIH, CEH, GPYC, LPT, CPT)
- Experience in conducting vulnerability scans, penetration testing, and risk assessments.
- Experience analyzing logs, mimic threat behaviors, and apply cybersecurity principles to organizational needs.
- Experience identifying security issues and recommending cost-effective security controls. null
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to
Vulnerability Assessment Scans for Entity in Annapolis, MD
Posted 12 days ago
Job Viewed
Job Description
Management Applications, Inc., a leading provider of Managed IT Services and Network Design and Implementation is seeking IT Professionals for positions with an entity in Annapolis, MD. Please submit a resume and salary requirements to be considered.
Background
Entity is located in Annapolis, Maryland. Entity provides network infrastructure and managed security for Maryland Government Entity. The network infrastructure is designed to provide the users with connectivity to the Entity's network. Entity Network Infrastructure comprises:
(1) Servers
- Wintel servers that use Active Directory (AD) directory service to manage identities and relationships
- UNIX servers that are LDAP compliant
- RADIUS servers
(2) Storage Area Network (SANs) devices and Network-Attached Storage (NAS) systems
(3) Cisco routers
(4) Cisco switches
(5) Load balancers
(6) Security provided by Cisco firewalls and intrusion detection systems (IDSs)
Job Responsibilities and Experience Requirements
- Perform a credentialed scan of no more than 1500 systems.
- Analyze scans to identify network & desktop vulnerabilities using COBIT 5 standards as a measurement;
- Report the vulnerability immediately upon discovery of a critical vulnerability and recommend remedial steps within one (1) business day following discovery;
- Submit a written report that:
- Identifies vulnerability gaps
- Recommends remedial steps required to bring the environment up to COBIT 5 standards;
- Formally present findings to Entity Management.
Background Check
Must be able to pass Criminal Justice Information System (CJIS) State and Federal criminal background check, including fingerprinting.
Possible Positions Available
Systems Analyst
Job Application Instructions:
To be considered for these positions please submit a resume (2 page max.) as well as minimum salary requirements . Please prominently feature the skills described above within the resume you submit. YOU MUST SUBMIT YOUR MINIMUM SALARY REQUIREMENTS. RESUMES WITHOUT MINIMUM SALARY REQUIREMENTS WILL NOT BE CONSIDERED.
Be The First To Know
About the latest Penetration testing Jobs in Washington !
Vulnerability Assessment Scans for Entity in Annapolis, MD
Posted 12 days ago
Job Viewed
Job Description
Management Applications, Inc., a leading provider of Managed IT Services and Network Design and Implementation is seeking IT Professionals for positions with an entity in Annapolis, MD. Please submit a resume and salary requirements to be considered.
Background
Entity is located in Annapolis, Maryland. Entity provides network infrastructure and managed security for Maryland Government Entity. The network infrastructure is designed to provide the users with connectivity to the Entity's network. Entity Network Infrastructure comprises:
(1) Servers
- Wintel servers that use Active Directory (AD) directory service to manage identities and relationships
- UNIX servers that are LDAP compliant
- RADIUS servers
(2) Storage Area Network (SANs) devices and Network-Attached Storage (NAS) systems
(3) Cisco routers
(4) Cisco switches
(5) Load balancers
(6) Security provided by Cisco firewalls and intrusion detection systems (IDSs)
Job Responsibilities and Experience Requirements
- Perform a credentialed scan of no more than 1500 systems.
- Analyze scans to identify network & desktop vulnerabilities using COBIT 5 standards as a measurement;
- Report the vulnerability immediately upon discovery of a critical vulnerability and recommend remedial steps within one (1) business day following discovery;
- Submit a written report that:
- Identifies vulnerability gaps
- Recommends remedial steps required to bring the environment up to COBIT 5 standards;
- Formally present findings to Entity Management.
Background Check
Must be able to pass Criminal Justice Information System (CJIS) State and Federal criminal background check, including fingerprinting.
Possible Positions Available
Systems Analyst
Job Application Instructions:
To be considered for these positions please submit a resume (2 page max.) as well as minimum salary requirements . Please prominently feature the skills described above within the resume you submit. YOU MUST SUBMIT YOUR MINIMUM SALARY REQUIREMENTS. RESUMES WITHOUT MINIMUM SALARY REQUIREMENTS WILL NOT BE CONSIDERED.
FLEX Application Security Testing Analyst

Posted 3 days ago
Job Viewed
Job Description
**Job Number** 25088041
**Job Category** Information Technology
**Location** Marriott International HQ, 7750 Wisconsin Avenue, Bethesda, Maryland, United States, 20814VIEW ON MAP ( Full Time
**Located Remotely?** N
**Position Type** Management
This is a temporary position.
The Application Security Testing Analyst will support the assessment and improvement of Web, API, Mobile application security through hands-on security testing and code analysis. The ideal candidate will have a solid foundation in secure coding practices, vulnerability detection, and testing techniques such as SAST, DAST, and manual testing. This role is designed to offer practical experience in application security testing, with opportunities to work directly with development teams, security tools, and automation in real-world environments.
**CANDIDATE PROFILE**
**Education and Experience**
**Required:**
+ Bachelor's degree in Cybersecurity, Computer Science or related field or equivalent experience/certification
+ 2+ years of information technology or application development experience
+ Strong understanding of programming concepts (e.g., loops, data types, logic, input/output)
+ Basic experience or familiarity with application security testing tools (e.g., Burp Suite, OWASP ZAP, Fortify, Veracode)
+ Understanding of the OWASP Top 10 and common application vulnerabilities (e.g., XSS, SQLi, CSRF)
+ Basic knowledge of vulnerability triage and remediation processes
+ Familiarity with version control (e.g., Git), CI/CD concepts, and the SDLC
+ Proficiency in Microsoft Word, PowerPoint, and Excel
+ Excellent communication skills
**Preferred:**
+ Master's degree in Cybersecurity, Computer Science, or related field or equivalent experience/certification
+ Security certifications (e.g., GWAPT, OSCP, CEH, Security+, or CySA+)
+ 2+ years of experience in an application security, QA, or software testing role
+ Experience performing web application penetration testing or source code review
+ Exposure to secure SDLC practices and integrating testing into CI/CD pipelines
+ Understanding of risk scoring frameworks (e.g., CVSS) and security ticketing workflows
+ Familiarity with compliance standards such as PCI-DSS, NIST 800-53, or ISO 27001
**CORE WORK ACTIVITIES**
**Application Security Risk Management & Tracking**
+ Application Security Testing & Risk Analysis
+ Assist with static and dynamic application security testing (SAST/DAST) using tools such as CodeQL, Trivy, Dependency Check, SonarQube, and Burp Suite
+ Perform basic manual testing and validation of vulnerabilities in development and pre-production environments
+ Support secure code reviews under supervision, identifying potential security flaws in application logic or design
+ Collaborate with software developers to provide guidance on secure coding practices and vulnerability remediation
+ Triage vulnerability reports and escalate findings based on severity and impact
+ Assist in the integration of security testing tools into CI/CD pipelines and automated testing environments
+ Contribute to the development of test cases and security use cases based on threat modeling or abuse case analysis
+ Support documentation of findings, test results, and risk assessments in systems such as JIRA or ServiceNow
+ Help maintain dashboards and reporting for tracking vulnerability trends and remediation status
+ Stay current on emerging security vulnerabilities, exploits, and application security best practices
+ Work closely with the Senior Manager to continuously improve the testing processes and tool coverage
+ Participate in knowledge sharing and security training initiatives with development teams
The pay range for this position is $33.94 to $53.46 per hour.
FLEX opportunities offer coverage for medical, dental, vision, health care flexible spending account, dependent care flexible spending account, life insurance, disability insurance, accident insurance, adoption expense reimbursements, paid parental leave, 401(k) plan, stock purchase plan, discounts at Marriott properties, commuter benefits, employee assistance plan, and childcare discounts. Benefits are subject to terms and conditions, which may include rules regarding eligibility, enrollment, waiting period, contribution, benefit limits, election changes, benefit exclusions, and others.
Marriott HQ is committed to a hybrid work environment that enables associates to Be connected. Headquarters-based positions are considered hybrid, for candidates within a commuting distance to Bethesda, MD.
_Marriott International is an equal opportunity employer. We believe in hiring a diverse workforce and sustaining an inclusive, people-first culture. We are committed to non-discrimination on any protected basis, such as disability and veteran status, or any other basis covered under applicable law._
Marriott International is the world's largest hotel company, with more brands, more hotels and more opportunities for associates to grow and succeed. **Be** where you can do your best work, **begin** your purpose, **belong** to an amazing global team, and **become** the best version of you.
Quality Assurance Analyst, Senior (Security and Non-Functional Testing)
Posted 22 days ago
Job Viewed
Job Description
This job opportunity is part of an RFP process; candidates are invited to submit their resumes detailing relevant experience.
Job Title: Quality Assurance Analyst, Senior (Security and Non-Functional Testing)
Onsite Requirement : A couple of days onsite required and travel to different sites.
Job Summary: The QA Analyst, Senior will play a critical role in ensuring the performance, security, and compliance of modernized systems developed Applications Modernization Project. The QA Analyst will be responsible for planning, designing, and executing test plans that address non-functional testing areas such as load, stress, volume, security, penetration, and system performance to ensure compatibility, scalability, and compliance with client security and technical standards. This role requires hands-on experience in both manual and automated testing, with a strong focus on performance testing and compliance auditing. Familiarity with tools like Selenium, Microsoft Test Suite, and modern performance testing platforms is essential.
Key Responsibilities
- Analyze business and technical requirements to derive non-functional testing strategies.
- Develop and execute detailed performance test plans, security test scenarios, and load test cases using industry-standard tools.
- Conduct manual and automated regression testing across various environments, incorporating cross-browser and cross-device testing methodologies.
- Collaborate with developers, system architects, and the cybersecurity team to identify performance bottlenecks and security vulnerabilities.
- Perform penetration testing in alignment with client's Third-Party Information Security Requirements.
- Ensure cross-browser and device compatibility (desktop, tablet, mobile).
- Use Selenium and Microsoft Test Suite for test automation and ensure full coverage of user workflows and APIs.
- Create and maintain documentation on test execution, results, anomalies, and improvements.
- Work closely with the client QA lead and developers to incorporate testing into CI/CD pipelines and Agile workflows.
- Support integration of automated and performance test scripts into DevOps pipelines for continuous testing.
- Participate in the development of client-required security artifacts and reporting structures.
- Support certification and auditing requirements by maintaining detailed logs, evidence, and compliance documentation.
- 8+ years of experience in QA and software testing with a focus on non-functional and security testing.
- Proven experience with Microsoft Test Manager, Coded UI, or equivalent testing suites.
- Proficiency with Selenium, Microsoft Test Suite, and performance testing tools such as JMeter, LoadRunner.
- Experience in all three testing domains: Manual Testing, Automation Engineering, and Performance Testing.
- Strong understanding of modern performance testing tools (e.g., JMeter, LoadRunner) and security tools (e.g., Burp Suite, OWASP ZAP).
- Experience testing .NET-based web applications and APIs integrated with modern SQL databases.
- Familiarity with legacy systems migration and large-scale public sector modernization projects.
- ISTQB or equivalent QA certification.
- Demonstrated ability to support auditing and compliance testing, including regression, load, and performance testing aligned with certification requirements.
- Experience in government or education sector IT projects
- Familiarity with DB2 to SQL migration testing.
- Demonstrated knowledge of test automation frameworks and scripting languages.
- Understanding of client's technology environment, technical standards, and third-party security compliance frameworks is a plus.
Compensation and Benefits
The projected compensation range for this position is $111,800 to $36,800 per year benchmarked in the Washington DC / Maryland area. The target salary is 124,000 for this role. The salary range provided is a good faith estimate representative of all experience levels. Salary at LCG is determined by various factors, including but not limited to role, location, the combination of education/training, knowledge, skills, competencies, certifications, and work experience.
LCG offers a competitive, comprehensive benefits package which includes health insurance options (medical, dental, vision), life and disability insurance, retirement plan contributions, as well as paid leave, federal holidays, professional development, and lifestyle benefits.
Devoted to Fair and Inclusive Practices
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.
If you are interested in applying for employment with LCG and need special assistance or an accommodation to apply for a posted position, contact our Human Resources department by email at .
Securing Your Data
Beware of fraudulent job offers using LCG's name. LCG will never request payment-related details or advancement of money during the application process. Legitimate communication will only come from lcginc.com or emails, not free commercial services like Gmail or WhatsApp. If you receive suspicious emails asking for payment or personal information, contact us immediately at .
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the .