Skip to main content

This job has expired

You will need to login before you can apply for a job.

Penetration Tester with Security Clearance

Employer
CACI
Location
Chantilly
Salary
85800.00 - 180200.00 USD Annual
Closing date
24 Apr 2024

View more

Sector
IT
Job Role
Penetration Tester
Job Type
Permanent
Penetration Tester Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: None What You'll Get to Do: Perform computer network evaluations to include penetration security assessments in a cybersecurity red team environment. These Qualifications Would be Nice to Have: Experience performing Red Team, Blue Team Operations.
Certifications such as OSCP, OSCE, GPEN, GWAPT, GPEN, GXPN, CEH, CISSP.
Malware analysis or digital computer forensics experience.
Cyber related Law Enforcement or Counterintelligence experience.
Scripting (Windows/ nix), Bash, Python, Perl or Ruby, Systems Programming is a plus.
Existing Subject Matter Expert of Advanced Persistent Threats and Emerging Threats.
Proactive interest in emerging technologies and techniques related to penetration testing.
Demonstrated real world experience performing grey and black box penetration testing.
Have an understanding of and interest in common web application vulnerabilities like XSS, CSRF, Command Injection, SQLi, single sign–on limitations, etc.
Must be proficient in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, Kali Linux, IPTables, Sysinternals, A/V evasion methodologies, Exploit Dev.
Must have solid working experience and knowledge of Windows operating systems (incl. Active Directory), Linux operating systems; ESXi or similar; mobile platforms are a plus.
Solid understanding of networking, TCP/IP, virtualization and cloud/data center architecture.
Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards.
Knowledge of exploitation concepts including phishing and social engineering tactics, buffer overflows, fuzzing, SQLi, MiTM, covert channels, secure tunneling and open source exfiltration techniques.
Active TS/SCI w/polygraph clearance.
Bachelors degree in related field. What We Can Offer You: We've been named a Best Place to Work by the Washington Post.
Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
We offer competitive benefits and learning and development opportunities.
We are mission–oriented and ever vigilant in aligning our solutions with the nation's highest priorities.
For over 55 years, the principles of CACI's unique, character–based culture have been the driving force behind our success. Company Overview: CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic. Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here The proposed salary range for this position is: $85,800 – $180,200

Get job alerts

Create a job alert and receive personalised job recommendations straight to your inbox.

Create alert