More jobs:
Penetration Tester
Job in
Reston, Fairfax County, Virginia, 22090, USA
Listed on 2026-03-01
Listing for:
Echelongov
Full Time
position Listed on 2026-03-01
Job specializations:
-
IT/Tech
Cybersecurity, Systems Engineer -
Engineering
Cybersecurity, Systems Engineer
Job Description & How to Apply Below
VA 79 - Reston, VA 20191 Overview Position Type:
Contractor Education Level: 4 Year Degree Category:
Professional Services Description
Position Title: Penetration Tester
Clearance Requirements: TS/SCI with CI Polygraph. Investigation or CV date within 5 years.
Qualified candidate will perform multi-discipline penetration testing of customer systems and global networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, and research on the latest exploitation techniques and threat vectors in support of authorized missions and test events.
Requirements- Hold or eligible for Top Secret/SCI security clearance with CI polygraph.
- Professional certifications to meet DoD 8570 IAT II requirements.
- Specialized penetration testing focused certification (CEH, Pentest+, GPEN, OSCP, etc.)
- Experience with at least one of the following scripting languages (Power Shell, Bash, Python, Ruby, Node.js)
- Experience performing web application security assessments.
- Experience with TCP/IP protocols as it relates to network security.
- Experience with offensive tool sets including Kali Linux, Metasploit, Cobalt Strike, Intercepting Proxies, etc.
- Experience in using network protocol analyzers and sniffers, as well as ability to decipher packet captures.
- Capable of conducting penetration tests on applications, systems and network utilizing proven/formal processes and industry standards.
- Perform penetration tests on computer systems, networks, and applications.
- Create new testing methods to identify vulnerabilities.
- Perform physical security assessments of systems, servers, and other network devices to identify areas that require physical protection.
- Pinpoint methods and entry points an attacker may use to exploit vulnerabilities or weaknesses.
- Search for weaknesses in common software, web applications and proprietary systems.
- Research, evaluate, document, and discuss findings with IT teams and management.
- Review and provide feedback for information security fixes.
- Establish improvements for existing security services, including hardware, software, policies, and procedures.
- Identify areas where improvement is needed in security education and awareness for users.
- Be sensitive to corporate considerations when performing testing (i.e., minimizing downtime and loss of employee productivity)
- Knowledgeable of the latest malware and security threats.
- In depth understanding of emerging threats, vulnerabilities, and exploits.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×