Senior Penetration Tester

Location: Laurel, MD
ApplyLogic is a fast-growing Veteran-Owned consulting firm, headquartered in Dunn Loring, VA. Our people are our greatest asset and our company culture is grounded on that belief. We offer challenging and interesting work in a friendly and supportive environment. We deliver best-in-class technical expertise to the Federal Government market through IT professional service contracts. 

We offer a competitive salary with a robust Fortune 500 type benefits package: employee assistance, employee adoption, 401K with match, medical, dental, vision, life, short-term and long-term disability, 15 paid time days off, 10 holidays, unlimited web-based training and up to $5K towards continuing education and/or professional development and more!
 
Founded in 2004, ApplyLogic is a Veteran Owned Small Business, ISO9001:2015 certified with over $7M annual revenues and 35 employees. Our growth has been recognized in the Washington Technology Fast 50 and the INC. 5000. We have an immediate Senior Penetration Tester position available in Laurel, MD.

Job Description and Responsibilities:
  • Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in network and on host.
  • Find evidence of attack, and attackers actions thereafter.
  • Work with team to produce effective countermeasures against found evidence.
  • Contributes to mitigations for future attacks of a similar nature.
  • Analyze infrastructure build sheets, Configuration Management Database (CMDB), NIST 800-53 ATO artifacts, Vulnerability scans, Access Control Lists (ACL), and vendor documentation to thoroughly understand software behaviors and interactions. .
  • Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs.
  • Conduct forensic testing and operational hardening of multiple OS platforms.
  • Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPS/IDS to create and implement a concrete plan of action to harden the defensive posture.
  • Work with SOC shift team to help contain intrusions.
  • Provides detailed requirements to team security engineers, SIEM specialists, and other team capability developers to provide reusable hunt tactics and techniques for other team analysts.
  • Provide detailed input to watchlog and provide thorough pass-down.
 
Required Experience:
 
  • Ability to understand netflow and PCAP. 
  • Thorough knowledge of open source tools to visualize PCAP data (Wireshark, TCPDump, etc.).
  • Detailed knowledge of various forms of social engineering, including the ability to recognize and handle spear-phishing campaigns or other forms of social engineering attacks.
  • Comprehensive knowledge of Windows and Linux behaviors, logging, vulnerabilities, exploits, and known attacks.
  • Use of IPSec packet filtering and Windows firewalls with specific application to defense in depth of network based attacks, data corruption, data theft, credential theft, and administrative control.
  • Red Team/Blue Team experience from a federal agency
 
Required Skills:
  • Expert knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS)
  • Deep technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures
  • Knowledge of how encryption, key management and cryptology works in the enterprise and in cyber data
  • Understanding of Enterprise Architecture Standards such as the Department of Defense Architecture Framework (DODAF), Service-Oriented Architecture (SOA), the Open Group Architecture Framework (TOGAF), and/or the Amazon Web Services (AWS) Well Architected Framework
  • Knowledge in the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines (risk profiling, control selection, control assessment, control monitoring)
  • Expertise in performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation
  • Expertise in Application Penetration Testing (fuzzing, reverse engineering, Fortify or similar, IDA Pro, Kali, BackTrack, OllyDbg, SQLMap, etc.)
  • Expertise in Proof of Concept (Exploit) development
  • Understanding of Secure SDLC (threat modelling, security requirements, secure design, secure implementation, secure testing, secure maintenance)
  • Knowledge of Mobile Application Security and MDM sensor data
  • Expertise in Embedded Device Security
  • Expertise in Malware Analysis
  • Expertise in a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Powershell, Python, BASH) software development frameworks, operating systems, and networking technologies.
  • Understanding of various web application frameworks such as ASP.NET, J2EE
  
Education and Certifications
  • Bachelor’s Degree and 10 years of experience
  • Preferred certifications
    • Certified Computer Security Incident Handler (CSIH)
    • Electronic Commerce Council Certified Ethical Hacker (CEH)
    • GIAC Information Security Fundamentals (GISF)
    • ISC2 Certified Information System Security Professional (CISSP)
 
Clearance:
  • U.S. Citizenship
  • Public Trust, or must be able to obtain a Public Trust clearance
this job portal is powered by CATS
ApplyLogic is an equal opportunity employer. The Equal Employment Opportunity Policy of ApplyLogic is to provide a fair and equal employment opportunity for all associates and job applicants regardless of race, color, religion, national origin, gender, sexual orientation, age, marital status or disability. ApplyLogic hires and promotes individuals solely on the basis of their qualifications for the job to be filled. ApplyLogic believes that associates should be provided with a working environment which enables each associate to be productive and to work to the best of his or her ability. We do not condone or tolerate an atmosphere of intimidation or harassment based on race, color, religion, national origin, gender, sexual orientation, age, marital status or disability.