Red Team White Box Tester / Penetration Testing

  • Posted 4 days ago | Updated 4 days ago

Overview

Remote
Contract - W2
Contract - Independent
Contract - 6

Skills

Mergers and Acquisitions
Reverse Engineering
C++
C#
Manual Testing
Malware Analysis
Operating Systems
White-box Testing
Network
Web Applications
Mobile Devices
Security QA
Social Engineering
Intelligence Collection
Scripting
Python
Windows PowerShell
Bash
Process Automation
Database Security
Testing
IBM DB2
MySQL
Metasploit
Nmap
Qualys
Nessus
Burp Suite
Wireshark
Apache Bloodhound
Research
Mainframe
Microsoft Windows
Unix
OS X
Cisco
Computer Science
Information Management
Penetration Testing
Information Assurance
Information Security
OSCP

Job Details

Remote if in: IL, TX, FL, GA, MA, MD, MN, NC, NJ, NY, DC, WI or in office (hybrid) Chicago, IL / Dallas, TX

Security Red Team White Box Tester / Penetration Testing

The role will continue passed the end of the year. It will be renewed

They have C2s and CVEs on their resumes.

The preference is if they do reverse engineering.

Heavy web penetration testing

coding languages like Python, C++, and C#.

Able to perform an exploit, found a bug that nobody found and reports it to the vendor

certs would be important like hack the box, bug bounty, ocsp, gxpn, etc.

heavy manual testing

malware development, etc.

The more they have on their resume that I just highlighted, the better

like minimum 3-8 years of experience, not people with 20 years of experience.

5+ Plus years penetration testing knowledge how to build command and control c2 infrastructure network/operating system application web mobile social engineering emissions signals white box penetration testing this is a hands-on hacker that can hack anything enterprise wide.

II. SKILL AND EXPERIENCE REQUIRED:

Desired:

  • Strong proficiency in Network, Web Application, and Mobile Device security testing
  • Demonstrated exploit, payload, and attack framework development experience
  • Strong knowledge of EDR detection capabilities such as Crowdstrike/Carbon Black, etc. and associated defense evasion techniques for behavioral based alerting
  • Strong proficiency in social engineering and intelligence gathering.
  • Strong experience with custom scripting (Python, Powershell, Bash, etc.) and process automation.
  • Knowledge how to build Command and Control (C2) infrastructure and execute Cyber Defense Evasion techniques to help enhance Cyber Defense monitoring/alerting capabilities for C2 traffic specifically
  • Strong understanding of security vulnerabilities and develop relevant exploits/payloads for use during Red Team activities
  • Strong experience with database security testing (MSSQL, DB2, MySQL, etc.).
  • Strong proficiency with common penetration testing tools (Kali, Armitage, Metasploit, Cobalt Strike, Nighthawk, Nmap, Qualys, Nessus, Burp Suite, Wireshark, Recon-NG, Ettercap/Bettercap, Hashcat, Bloodhound, Ida Pro, Ghidra, Sublist3r, Rubeus, Mimikatz, CrackMapExec, Exploitdb, Yersinia, Impacket, etc.).
  • Track record of vulnerability research and CVE assignments
  • Knowledge of Windows APIs and Living off the Land (LOL) Binaries
  • Experience with Mainframes, Windows, Unix, MacOS, Cisco, platforms and controls.

Education and/or Experience:

  • BS in Computer Science, Information Management, Information Security or other comparable technical degree from an accredited college/university desired.
  • 3+ Years' experience of Penetration testing
  • 5+ Years' experience in Information Assurance or Information Security environment.

Certifications:

  • [Preferred] Professional security certifications a plus (OSCP, OSWE, GXPN, GMOB, GWAPT, etc.)

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.