Overview
Skills
Job Details
Remote if in: IL, TX, FL, GA, MA, MD, MN, NC, NJ, NY, DC, WI or in office (hybrid) Chicago, IL / Dallas, TX
Security Red Team White Box Tester / Penetration Testing
The role will continue passed the end of the year. It will be renewed
They have C2s and CVEs on their resumes.
The preference is if they do reverse engineering.
Heavy web penetration testing
coding languages like Python, C++, and C#.
Able to perform an exploit, found a bug that nobody found and reports it to the vendor
certs would be important like hack the box, bug bounty, ocsp, gxpn, etc.
heavy manual testing
malware development, etc.
The more they have on their resume that I just highlighted, the better
like minimum 3-8 years of experience, not people with 20 years of experience.
5+ Plus years penetration testing knowledge how to build command and control c2 infrastructure network/operating system application web mobile social engineering emissions signals white box penetration testing this is a hands-on hacker that can hack anything enterprise wide.
II. SKILL AND EXPERIENCE REQUIRED:
Desired:
- Strong proficiency in Network, Web Application, and Mobile Device security testing
- Demonstrated exploit, payload, and attack framework development experience
- Strong knowledge of EDR detection capabilities such as Crowdstrike/Carbon Black, etc. and associated defense evasion techniques for behavioral based alerting
- Strong proficiency in social engineering and intelligence gathering.
- Strong experience with custom scripting (Python, Powershell, Bash, etc.) and process automation.
- Knowledge how to build Command and Control (C2) infrastructure and execute Cyber Defense Evasion techniques to help enhance Cyber Defense monitoring/alerting capabilities for C2 traffic specifically
- Strong understanding of security vulnerabilities and develop relevant exploits/payloads for use during Red Team activities
- Strong experience with database security testing (MSSQL, DB2, MySQL, etc.).
- Strong proficiency with common penetration testing tools (Kali, Armitage, Metasploit, Cobalt Strike, Nighthawk, Nmap, Qualys, Nessus, Burp Suite, Wireshark, Recon-NG, Ettercap/Bettercap, Hashcat, Bloodhound, Ida Pro, Ghidra, Sublist3r, Rubeus, Mimikatz, CrackMapExec, Exploitdb, Yersinia, Impacket, etc.).
- Track record of vulnerability research and CVE assignments
- Knowledge of Windows APIs and Living off the Land (LOL) Binaries
- Experience with Mainframes, Windows, Unix, MacOS, Cisco, platforms and controls.
Education and/or Experience:
- BS in Computer Science, Information Management, Information Security or other comparable technical degree from an accredited college/university desired.
- 3+ Years' experience of Penetration testing
- 5+ Years' experience in Information Assurance or Information Security environment.
Certifications:
- [Preferred] Professional security certifications a plus (OSCP, OSWE, GXPN, GMOB, GWAPT, etc.)