Agile Defense

Penetration Tester / Threat Emulator

Agile Defense

full-time

Posted on:

Origin:  • 🇺🇸 United States • District of Columbia, Washington

Visit company website
AI Apply
Manual Apply

Job Level

Mid-LevelSenior

Tech Stack

Cyber SecurityPythonTypeScript

About the role

  • Supports federal government "purple team" ops providing Computer Network Defense, Offense, Incident Response, and Threat Emulation
  • Assist cybersecurity operations to identify risks and exposures using advanced security/pen testing and auditing
  • Perform real-world threat activity simulation attacks to train and measure defenses
  • Analyze systems for weaknesses, devise tests and scenarios, document results, and recommend improvements
  • Develop automated testing and customized Python and PowerShell scripts, payloads, and backdoor emulations
  • Map Cyber Key Terrain, generate priority target lists, and research emerging threats and tools
  • Utilize ODNI Cyber Threat Framework and produce Threat Emulation findings in that format
  • Report and brief threat emulation operations and provide capability enhancement recommendations

Requirements

  • One or more certifications: GCIA, GCED, GCFE, GCTI, GNFA, GCIH, CND, ECSA, OSCP, OSEE, OSCE,  GCFA, GREM, CHFI
  • Offensive Security Certified Professional - OSCP (optional but preferred), Certified Ethical Hacker - CEH (optional)
  • Typically has a bachelor degree, and 4-5 years of experience, or equivalent relevant work experience
  • Threat Emulation SMEs must have at least 4-5 years of experience in incident detection, cyber defense, cyber intelligence analysis, and/or Penetration Testing
  • Bachelor’s Degree in Information Technology, Cyber Security, Computer Science, Computer Engineering, Electrical Engineering, or related field of study
  • Active Top Secret Clearance and SCI Eligibility
  • Strong analytical and technical skills in computer network defense operations
  • Prior experience and ability with analyzing threat intelligence/information or providing cyber defense analytical capabilities to assist in proactive identification of threats, events, and incidents
  • Ability to develop rules, filters, views, signatures, countermeasures and operationally relevant applications and scripts to support efforts
  • Strong logical/critical thinking abilities, especially analyzing vulnerability information and current adversarial TTPs and IOCs
  • Strong proficiency Report writing – a technical writing sample and technical editing test will be required if the candidate has no prior published intelligence analysis reporting
  • Excellent organizational and attention to detail in tracking activities as part of overall Security Operation workflows or projects
  • Experience with the identification and implementation of defensive countermeasures or mitigating controls for deployment and implementation in the enterprise network environment
  • Experience in mentoring and training analysts or Red Team members
  • Knowledge of different operational threat environments and general attack stages
  • Knowledge of incident categories, incident responses, and timelines for responses