×
Register Here to Apply for Jobs or Post Jobs. X

IT Security Specialist - Penetration Tester; Surge

Job in Silver Spring, Montgomery County, Maryland, 20900, USA
Listing for: Attainx Inc.
Full Time position
Listed on 2025-10-30
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Salary/Wage Range or Industry Benchmark: 125000 - 150000 USD Yearly USD 125000.00 150000.00 YEAR
Job Description & How to Apply Below
Position: IT Security Specialist - Penetration Tester (Surge Support)

Attainx Inc.

IT Security Specialist – Penetration Tester

Location: Hybrid (Reside within a commutable distance of Silver Spring, MD to work onsite as required)

Citizenship: US Citizen

Security Clearance: Must hold a Valid NOAA / NWS / DoC Public Trust

Exemption Status: Computer Exempt

Surge Support

Attain

X, Inc. is in search of a highly energetic Penetration Tester to join our team on a cyber security program supporting our US federal government client. We’re looking for a seasoned professional with a minimum of 5 years of proven expertise in penetration testing and ethical hacking. In this role, you’ll identify, exploit, and report security weaknesses across AWS, Azure, and on‑premises infrastructure, directly contributing to fortifying critical systems and protecting sensitive data from evolving cyber threats.

Qualifications

and Education Requirements

Basic Qualifications:

  • A minimum of 5 years of proven penetration testing and ethical hacking experience.
  • Hands‑on experience in penetration testing across AWS, Azure, and On‑Premise environments.
  • At least 5 years of recent experience in applying IT security concepts, methodologies, principles, procedures and using industry‑standard IT security tools (e.g. Burp Suite, Metasploit, Wireshark).
  • At least 5 years of recent experience with enterprise architecture methodologies, concepts, procedures, principles, and tools.
  • At least 5 years of recent experience in contingency planning and backup and recovery best practices and application of NIST guidance.
  • At least 5 years of recent experience in using technical testing tools (Tenable Security Center, Arc Sight, IBM Big Fix, etc.).
  • At least 5 years of recent experience in conducting penetration testing or the ability to bring in a penetration tester when required.
  • At least 5 years of performing assessments of Federal Information Systems using the Risk Management Framework.
  • Possess at least one of the following professional certifications required by DOC Enterprise Cybersecurity Policy Annex C‑1:
  • Controls Assessor
  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Systems Auditor (CISA)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Systems and Network Auditor (GSNA)
  • Electronic Commerce Council Certified Ethical Hacker (CEH)
  • ISC2 Certified in Governance, Risk and Compliance (CGRC)
  • Security Certified Network Professional (SCNP)
  • Security Certified Network Architect (SCNA)
    • Proficiency in verbal and written communications.
    • Proficiency in interview skills.
    • Proficiency in interpersonal skills.
    • Proficiency in handling multiple tasks concurrently.
    • Proficiency in project and time management.
    • Ability to adjust to changing priorities.
    • Ability to work in a cohesive team‑oriented environment.
    • Must be a US Citizen able to obtain and maintain a Moderate Public Trust.
    Preferred Qualifications
    • Knowledge of DOC, NOAA, and NWS IT security policies and implementation standards or those of similar sized organizations and comprehensive understanding of NIST guidance including Special Publications and Federal Information Processing Standards.
    • Self‑starter, highly motivated individual who adapts to a dynamic work environment.
    • Strong attention to detail with an ability to operate effectively across multiple priorities.
    Education / Experience

    Ideal for candidates with 5–7 years of hands‑on penetration testing experience who are looking to advance into intermediate‑level roles.

    Duties
    • Protocol analysis, vulnerability discovery and exploitation, post‑exploitation impact analysis, and physical security.
    • Highly technical problem‑solver who understands software architectures, security, communication protocols, virtualization, and hardware, and works with other engineers to resolve problems in design, development, and operations.
    • Perform manual and automated firmware analysis on target devices.
    • Perform pen tests, fuzzing and custom exploit attacks against client systems.
    • Review deployment architectures, topologies and conops for compliance regulatory security mandates.
    • Produce security reports suitable for submission to regulatory bodies.
    • Conduct hands‑on technical testing beyond automated tool validation, including full exploitation and leveraging…
    To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary