Penetration Testing - Mid

ECS_FEDERAL
Suitland, MD Full Time
POSTED ON 6/23/2023 CLOSED ON 6/27/2023

What are the responsibilities and job description for the Penetration Testing - Mid position at ECS_FEDERAL?

ECS is seeking a Penetration Testing - Mid to work in our Suitland, MD office.  

 

Job Description:

  • Identify threat tactics, methodologies, gaps, and shortfalls.
  • Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable).
  • Identify security implications and apply methodologies within centralized and decentralized environments across the enterprise’s computer systems in software development.
  • Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.
  • Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure that recommended products are in compliance with organization's evaluation and validation requirements.
  • Identify, collect, and seize documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents, investigations, and operations.
  • Maintain baseline system security according to organizational policies.
  • Maintain database management systems software.
  • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
  • Manage threat or target analysis of cyber defense information and production of threat information within the enterprise.
  • Monitor and evaluate a system's compliance with information technology (IT) security, resilience, and dependability requirements.
  • Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection.
  • Verify stability, interoperability, portability, and/or scalability of system architecture.
  • Work with stakeholders to resolve computer security incidents and vulnerability compliance

 

Required Skills:

  • Identify threat tactics, methodologies, gaps, and shortfalls.
  • Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable).
  • Identify security implications and apply methodologies within centralized and decentralized environments across the enterprise’s computer systems in software development.
  • Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.
  • Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure that recommended products are in compliance with organization's evaluation and validation requirements.
  • Identify, collect, and seize documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents, investigations, and operations.
  • Maintain baseline system security according to organizational policies.
  • Maintain database management systems software.
  • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
  • Manage threat or target analysis of cyber defense information and production of threat information within the enterprise.
  • Monitor and evaluate a system's compliance with information technology (IT) security, resilience, and dependability requirements.
  • Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection.
  • Verify stability, interoperability, portability, and/or scalability of system architecture.
  • Work with stakeholders to resolve computer security incidents and vulnerability compliance.
  • Bachelor's degree

 

Desired Skills:

  • Experience conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • Skill in detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort).
  • Skill in determining an appropriate level of test rigor for a given system.
  • Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
  • Developing data dictionaries, data models, operations-based testing scenarios, security system access controls.
  • Skill in mimicking threat behaviors, optimizing database performance, and performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
  • Experience identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files).
  • Collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data.
  • Setting up a forensic workstation and forensic tool suites (e.g., EnCase, Sleuthkit, FTK).
  • Analyzing anomalous code as malicious or benign, volatile data.
  • Interpreting results of debugger to ascertain tactics, techniques, and procedures.
  • Skill in Regression Analysis (e.g., Hierarchical Stepwise, Generalized Linear Model, Ordinary Least Squares, Tree-Based Methods, Logistic).

 

ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis of race, color, religion, gender, age, national origin, citizenship, disability, veteran status or any other classification protected by federal, state, or local law. ECS promotes affirmative action for minorities, women, disabled persons, and veterans.

 

ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3000 employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.

General Description of Benefits

Back Share
Apply Now
Information Security Analyst (Penetration Testing)
Tevora -
Fairfax, VA
Sr. Security Engineer, Penetration Testing
Warner Bros. Discovery -
Silver Spring, MD
Penetration Tester
Steneral Consulting -
Manassas, VA

For Employer
Looking for Real-time Job Posting Salary Data?
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

Sign up to receive alerts about other jobs with skills like those required for the Penetration Testing - Mid.

Click the checkbox next to the jobs that you are interested in.

  • Access Control Skill

    • Income Estimation: $59,639 - $88,941
    • Income Estimation: $74,968 - $98,739
  • Data Analysis Skill

    • Income Estimation: $57,933 - $86,448
    • Income Estimation: $60,020 - $86,437
This job has expired.
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at ECS_FEDERAL

ECS_FEDERAL
Hired Organization Address Washington, DC Full Time
ECS is seeking a Requirements Analyst to work in our Metro DC area Hybrid Remote office . Please Note: This position is ...
ECS_FEDERAL
Hired Organization Address Warner, GA Full Time
ECS is seeking a Senior SIGINT System Engineer to work in our Warner Robins, GA office. Job Description: ECS is seeking ...
ECS_FEDERAL
Hired Organization Address Pittsburgh, PA Full Time
ECS is seeking an Oracle DBA (Int) to work in our Pittsburgh, PA office . Please Note: This position is contingent upon ...
ECS_FEDERAL
Hired Organization Address Morgantown, WV Full Time
ECS is seeking an Information Security Engineer (Senior) to work in our Morgantown, WV office Please Note: This position...

Not the job you're looking for? Here are some other Penetration Testing - Mid jobs in the Suitland, MD area that may be a better fit.

Penetration Testing Team Lead

gTANGIBLE Corporation, Arlington, VA

Penetration Testing SME

Agile Defense, Alexandria, VA