ANALYGENCE · 2 hours ago
Penetration Tester
ANALYGENCE, Inc. is seeking a Penetration Tester to conduct assessments of threats and vulnerabilities in support of the Air Combat Command's 67th Cyberspace Wing. The role involves analyzing cyber defense policies, developing exploits for vulnerabilities, and conducting penetration testing on enterprise network assets.
Information ServicesInformation Technology
Responsibilities
Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives
Analyze software applications to gain an understanding of the system, mission and or application vulnerabilities and exploits
Develop exploits for exposed vulnerabilities with a focus on non-interference of mission partner systems and networks
Conduct and/or support authorized penetration testing on enterprise network assets
Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions
Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing
Prepare audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions
Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], TEMPEST countermeasure reviews)
Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications)
Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes)
Position requires travel up to 25% supporting customer assessments up to 1-4 weeks in duration
Qualification
Required
Current Top Secret clearance with SCI eligibility
Bachelor's degree in a related field and a minimum of 8-12 years of experience providing related penetration testing services
IAT Level III certification required (CASP, CISSP+, CISA, etc.)
Experience with computer networking concepts and protocols, and network security methodologies
Understanding risk management processes (e.g., methods for assessing and mitigating risk), laws, regulations, policies, and ethics as they relate to cybersecurity and privacy, cybersecurity and privacy principles, cyber threats and vulnerabilities, specific operational impacts of cybersecurity lapses and application vulnerabilities
Knowledge of cryptography and cryptographic key management concepts, data backup and recovery, host/network access control mechanisms (e.g., access control list, capabilities lists)
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML), how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL])
Knowledge of programming language structures and logic, system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)
Knowledge of systems diagnostic tools and fault identification techniques and what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities
Knowledge of interpreted and compiled computer languages, different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks)
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored), system administration, network, and operating system hardening techniques
Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth), security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model)
Knowledge of ethical hacking principles and techniques and data backup and restoration concepts, system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems and infrastructure supporting information technology (IT) for safety, performance, and reliability
Knowledge of an organization's information classification program and procedures for information compromise, packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
Knowledge of cryptology, network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services
Knowledge of penetration testing principles, tools, and techniques and an organization's threat environment
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)
Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems and assessing the robustness of security systems and designs
Detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort)
Experience in mimicking threat behaviors, the use of penetration testing tools and techniques and the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.)
Network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.), reviewing logs to identify evidence of past intrusions and conducting application vulnerability assessments
Perform impact/risk assessments and develop insights about the context of an organization's threat environment
Experience with cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) and the ability to identify systemic security issues based on the analysis of vulnerability and configuration data
Programming language structures (e.g., source code review) and logic and the ability to share meaningful insights about the context of an organization's threat environment that improve its risk management posture
Understanding cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
Company
ANALYGENCE
ANALYGENCE is an IT solution company that provides cyber solutions, analytics, strategy development & implementation & mission optimization.
Funding
Current Stage
Growth StageRecent News
2025-03-20
2024-06-01
Company data provided by crunchbase