Connect with social network:
Jobs in India
View Saved Jobs
Tell a Friend
Flag This Job
Print This Ad
Maganti IT Resources LLC
5medow street,Suite 201,202
naugatuck, CT, United States
Penetration Tester (IT Security) @ Washington, DC
Washington, DC, United States
Duration: 3-5 Years
Able to quickly master new technology / software for the purposes of evaluating or subverting the security functionality of the technology / software.
Candidate will provide technical information system security testing in support of the judiciary security risk management process.
Techniques used in the security assessment and technical testing efforts include in-depth network and application vulnerability testing (both automated and manual testing), demonstrable false positive validation.
Automated testing will include tools such as: Tenable Nessus, Cenzic Hailstorm, BurpSuite Professional, DBProtect, Core Impact, Nmap, Metasploit, and other tools found in the BackTrack and Samurai Web Testing Framework distributions.
The candidate shall develop documentation in support of testing efforts that may include: Test Plans, Preliminary Findings Reports, Security Assessment Reports, and other, similar test artifacts, as required by the government.
Must be able to quickly master new technology / software for the purposes of evaluating or subverting the security functionality of the technology / software
All candidates shall be comfortable using, configuring, troubleshooting, and administering both Linux and Microsoft operating systems with extensive experience with at least one of these operating systems.
Have a broad knowledge of
security best practices, security solutions, and methodologies
advanced security assessments, to include manual assessments and malicious user testing.
Have a broad and expert knowledge of
security assessment tools and manual security testing techniques
security tool strengths and weaknesses and ability to select, configure, troubleshoot and use the best “tool for the job”.
Have a broad knowledge of
cyber security threats and techniques used
by adversaries to compromise systems – both technical and non-technical techniques.
Have the ability to think creatively, to think critically, to analyze complex concepts, to articulate themselves clearly and concisely, and to conduct themselves in a professional manner.
Candidates should be skilled in multiple of the following areas:
: Expert understanding of the following operating systems and their related security concern
desktop/server operating systems (Microsoft Windows 2000 and up)
Ubuntu, Red Hat Enterprise, SUSE Enterprise
, and knowledge of
Apple OS X operating systems
Web Applications & Technologies
: Advanced understanding of application programming languages, application servers, web services, browser technology, common vulnerabilities, security best practices, and automated assessment tools and manual testing techniques specific to web applications.
Storage & Databases
: Advanced understanding of
relational database, database management systems, enterprise storage solutions,
specific to these technologies.
: Experience with
Java, Microsoft .NET, Python, Perl, Ruby, Linux/UNIX Shell Scripting.
Certifications are a PLUS
Should someone need more information I can be reached at
Thank you for your time
© 2016 Powered by
Terms and Conditions