Image-HasTech

REMOTE Penetration Tester

Piper Companies
  • Remote, USA
Salary: $115,000 per year

Description

About the job Zachary Piper Solutions is seeking a Mid-level Penetration Tester for a position supporting a leading government cybersecurity consultancy firm based in Northern Virginia. This role is fully remote. The Mid-level Penetration Tester will expertly probe clients' cyber defenses, identifying vulnerabilities and strengthening their security posture against potential threats.

Role and Responsibilities

  • Responsibilities of the Penetration Tester: Execute in-depth security assessments and emulate complex cyberattacks to pinpoint vulnerabilities in diverse technologies for a global client base. Perform detailed source code reviews, web application, API, and mobile application penetration testing on iOS and Android platforms. Provide expert security advice to clients, devise strategic remediation plans to address findings, and manage task priorities to hit utilization targets. Uphold professional conduct in client interactions and ensure the timely delivery of high-quality products and services. Foster personal professional growth through industry certifications, work collaboratively with project teams, and contribute to achieving customer satisfaction and project objectives. Necessary Qualifications for the Penetration Tester: 5+ years of experience in cyber security, including at least 1 year of RedTeam and AppSec experience. Experience using Offensive Security Penetration Testing Tools - background in programming is a plus Strong customer-facing skills Bachelor’s preferred CISSP highly preferred Nice to haves; OSCP, OSCE, GPEN, eJPT, etc. Compensation for the Penetration Tester: Salary Range: $115,000 - $140,000 **dependent on experience** Full Standard Benefits: Paid Holidays, Healthcare (Medical, Dental, Vision), Retirement Savings Plan (401K), and more Keywords: Penetration Tester, Mid-level Penetration Tester, Cybersecurity, Security Consultant, Remote Penetration Testing, Ethical Hacker, Security Assessor, Cyber Defense Analyst, Vulnerability Assessor, Red Team Operator, Application Security Tester, Information Security Analyst, Security Assessments, Cyberattacks Emulation, Vulnerability Identification, Source Code Review, Web Application Penetration Testing, API Penetration Testing, Mobile Application Penetration Testing, iOS Security Testing, Android Security Testing, Offensive Security Tools, Penetration Testing Tools, RedTeam, AppSec, CISSP, OSCP, OSCE, GPEN, eJPT, Cyber Security Certification, Bachelor’s Degree, Security Clearance, Secret Clearance, TS Clearance, Top Secret Clearance, Cybersecurity Experience, Professional Growth, Industry Certifications, Client Interaction, Client Satisfaction, Professional Conduct, High-Quality Delivery, Project Management, Utilization Targets, Security Posture, Security Remediation Strategy, Northern Virginia, NOVA Cybersecurity, Remote Work, Remote Cybersecurity Position, Zachary Piper Solutions, Government Cybersecurity Consultancy, Cyber Security Analyst, Information Assurance, Network Security, Security Engineer, Pen Testing, Vulnerability Analysis, Exploit Development, Security Audits, Risk Assessment, Threat Intelligence, Incident Response, Security Operations Center, SOC Analyst, Intrusion Detection, Firewall, Intrusion Prevention Systems, IPS, SIEM, Security Information and Event Management, Compliance, NIST Framework, ISO 27001, Encryption, Cryptography, Data Security, Reverse Engineering, Malware Analysis, Forensics, Computer Forensics, Digital Forensics, Scripting, Python, Bash, PowerShell, Ruby, Perl, C++, Java, SQL Injection, Cross-site Scripting, XSS, CSRF, Command Injection, Buffer Overflow, OWASP, Open Web Application Security Project, SANS Institute, CompTIA Security+, CEH, Certified Ethical Hacker, CASP, CompTIA Advanced Security Practitioner, CISM, Certified Information Security Manager, Cyber Security Consulting, Security Architecture, Cloud Security, AWS Security, Azure Security, GCP Security, Virtualization Security, Endpoint Security, Antivirus, EDR, Endpoint Detection and Response, IAM, Identity and Access Management, PIV, Personal Identity Verification, Biometrics, Two-Factor Authentication, 2FA, Multi-Factor Authentication, MFA, VPN, Virtual Private Network, Penetration Testing Frameworks, Metasploit, Burp Suite, Kali Linux, Backtrack, Nessus, Qualys, Snort, Wireshark, TCP/IP, Network Protocols, LDAP, Active Directory, Cybersecurity Policy, Cybersecurity Strategy, Cybersecurity Training, Security Awareness, Phishing, Spear Phishing, Social Engineering, Zero-Day, Patch Management, Configuration Management, DevSecOps, Secure Coding, Secure Software Development Lifecycle, SSDLC, Agile, Scrum, Project Planning, Team Leadership, Client Proposals, Security Solutions, Technical Writing, Communication Skills, Presentation Skills, Negotiation Skills, Analytical Skills, Problem-Solving Skills, Organizational Skills, Time Management, Detail Oriented, Proactive, Self-Motivated, Secret Clearance, TS/SCI, Top Secret/Sensitive Compartmented Information, Eligibility for Clearance, Military Experience, Department of Defense, DoD, Federal Government, Government Contracting, Cybersecurity Regulations, FISMA, Federal Information Security Management Act, HIPAA, Health Insurance Portability and Accountability Act, PCI-DSS, Payment Card Industry Data Security Standard, GDPR, General Data Protection Regulation, Cybersecurity Frameworks, Security Best Practices, Threat Modeling, Penetration Testing Reports, Security Policy Development, Security Controls, Technical Assessments, Security Infrastructure, Secure Network Design, Secure Communications, Cryptographic Protocols, Secure Protocols, Hardening Techniques, Cyber Threat Landscape, Advanced Persistent Threats, APT, Cyber Kill Chain, Lateral Movement, Root Cause Analysis, Cybersecurity Metrics, KPIs, Key Performance Indicators, Security Posture Assessment, Continuous Monitoring, Cyber Resilience, Threat Hunting, Active Cyber Defense, Cybersecurity Innovation, Emerging Technologies, Artificial Intelligence in Cybersecurity, Machine Learning, Anomaly Detection, Behavioral Analytics, Threat Intelligence Platforms, TIPs, Cybersecurity Conferences, Cybersecurity Publications, Cybersecurity Community, Professional Networking, Continuous Education, Security Research, Vulnerability Disclosure, Bug Bounty Programs, HackerOne, Bugcrowd, Security Compliance Standards, Auditing Standards, Cybersecurity Law, Legal Aspects of Cybersecurity, Ethical Guidelines, Code of Conduct, Privacy Laws, Data Protection Officer, DPO, Information Systems, Management Information Systems, Computer Science Degree, Information Technology, IT Security, Network Administration, Systems Administration, Cloud Administration, Security Operations, Cybersecurity Operations

Summary

Job Type : Full_Time
Designation : REMOTE Penetration Tester
Posted on : 30 April 2024
Department : IT areas
Salary : $115,000 per year
Qualification : Bachelor’s degree in information security
Work experience : 5 - 8 Years
Openings : 5
Email : [email protected]
Contact : (703) 972-2092
Website : https://careers.zacharypiper.com/details/119507/remote_penetration_tester#apply
Application End : 15 May 2024