Search for More Jobs
Get alerts for jobs like this Get jobs like this tweeted to you
Company: SAIC
Location: Beltsville, MD
Career Level: Entry Level
Industries: Technology, Software, IT, Electronics

Description

Description

SAIC is seeking a highly motivated Penetration Tester. The successful candidate will provide support to the Cybersecurity Integrity Center (CIC) in the Department of State Bureau of Diplomatic Technologies (DT). Duties are in the Washington, D.C. metropolitan area (30% in downtown D.C; 70% in Beltsville, MD. The CIC supports cybersecurity monitoring, threat analysis, incident response, and infrastructure remediation within and across all of the State Department's information technology (IT) infrastructure. The CIC coordinates and collaborates with other State Department bureaus as well as other organizations within the Federal Government, and commercial partners.

This role requires 4 days/week onsite.  May be 5 days while pen test is being performed.

Description of Duties:

The Penetration Tester will provide support for HVA Assessments using methodology by Cybersecurity and Infrastructure Security Agency (CISA) Assessment Evaluation and Standardization (AES) program with broad and in-depth knowledge to conduct offensive cyber operations across the organization globally. In this role, you will conduct offensive security operations to emulate adversary tactics and procedures to test preventative, detective, and response controls across the global technology landscape. The Penetration Tester will:

  • Conduct highly complex offensive security operations testing consistent with known adversary tactics techniques and procedures and contribute to the development of objectives and approaches taken to remediate risk.
  • Apply sound technical and management principles to identify and remediate cybersecurity --vulnerabilities across the State Department global IT enterprise infrastructure and evaluate system perform risk assessments, and evaluate performance metrics.

Responsibilities include:

  • Develop, Identify and resolve security vulnerabilities related to deployment and testing processes
  • Collaborate with Department and external cyber stakeholders on cybersecurity technology implementations to meet specific operational needs.
  • Perform technical evaluations of recommended vulnerability mitigation actions and make recommendations based on impact and/or other countermeasures.
  • Conduct assessments of threats and vulnerabilities; determine deviations from acceptable configurations, enterprise, or local policy; assess the level of risk; and develop and/or recommend appropriate mitigation countermeasures in operational and non-operational situations
  • Network Mapping include but are not limited to a network map of the organization's system that includes a visual representation of the organization's physical devices and digital network.
  • Perform operation and maintenance activities in support of existing CIC cyber tools and technologies (MSV, Qualys, Tenable Nessus and others).
  • Identify, diagnose, and prioritize anomalies in cyber defense infrastructure and resources.
  • Perform cybersecurity testing of developed applications and/or systems.  Identify and direct the remediation of technical problems encountered during testing and implementation of new systems.
  • Document security issues and impacts identified through offensive operations in a clear and concise manner to facilitate reporting to impacted stakeholders.

Qualifications

Required Education & Experience:

  • Bachelor's and five (5) years or more experience; Master's and three (3) years or more experience.
  • A degree in Cybersecurity or related field.
  • 4-6+ years penetration testing experience.
  • Web application penetration testing, LPT, Source code vulnerability analysis, serious problem-solving skills experience.
  • All penetration testers/operators must be DHS/CISA AES qualified within 90 days of onboarding.

Required Clearance

  • US Citizenship.
  • Active Top Secret Clearance.

Desired:

  • LPT (Licensed Penetration Testers.
  • 4 years Microsoft Operating Systems (OS) engineering and support experience focusing on Active. Directory (AD), System Center Configuration Manager (SCCM), System Center Operations Manager (SCOM).
  • Familiarity of various analytical tools (Splunk, USBDeview, Netwitness, MimiKatz).
  • Understanding of Security Information and Event Management (SIEM) tools (Splunk, McAfee).
  • Familiarity of Cobalt Strike, Nessus, Kali Linux, Burp Suite, Nmap and OpenVAS for databases.
  • Skill in the use of social engineering techniques and using penetration testing tools.
  • Interpersonal skills including the ability to collaborate effectively, and excellent written and oral communications.
  • Network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Server/endpoint OS (Microsoft, Linux, IOS) along with mobile and cloud technologies.
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration Protocol (DHCP), domain name system, and directory services.
  • Ability to generate and implement capabilities to monitor organization's network in real-time.
  • Ability to provide Vulnerability Scanning Risk Assessment.

Target salary range: $160,001 - $200,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.


 Apply on company website