IT Security Specialist - Penetration Tester; Surge
Listed on 2025-10-30
-
IT/Tech
Cybersecurity, IT Consultant
Attainx Inc.
IT Security Specialist – Penetration Tester
Location: Hybrid (Reside within a commutable distance of Silver Spring, MD to work onsite as required)
Citizenship: US Citizen
Security Clearance: Must hold a Valid NOAA / NWS / DoC Public Trust
Exemption Status: Computer Exempt
Surge Support
Attain
X, Inc. is in search of a highly energetic Penetration Tester to join our team on a cyber security program supporting our US federal government client. We’re looking for a seasoned professional with a minimum of 5 years of proven expertise in penetration testing and ethical hacking. In this role, you’ll identify, exploit, and report security weaknesses across AWS, Azure, and on‑premises infrastructure, directly contributing to fortifying critical systems and protecting sensitive data from evolving cyber threats.
and Education Requirements
Basic Qualifications:
- A minimum of 5 years of proven penetration testing and ethical hacking experience.
- Hands‑on experience in penetration testing across AWS, Azure, and On‑Premise environments.
- At least 5 years of recent experience in applying IT security concepts, methodologies, principles, procedures and using industry‑standard IT security tools (e.g. Burp Suite, Metasploit, Wireshark).
- At least 5 years of recent experience with enterprise architecture methodologies, concepts, procedures, principles, and tools.
- At least 5 years of recent experience in contingency planning and backup and recovery best practices and application of NIST guidance.
- At least 5 years of recent experience in using technical testing tools (Tenable Security Center, Arc Sight, IBM Big Fix, etc.).
- At least 5 years of recent experience in conducting penetration testing or the ability to bring in a penetration tester when required.
- At least 5 years of performing assessments of Federal Information Systems using the Risk Management Framework.
- Possess at least one of the following professional certifications required by DOC Enterprise Cybersecurity Policy Annex C‑1:
- Proficiency in verbal and written communications.
- Proficiency in interview skills.
- Proficiency in interpersonal skills.
- Proficiency in handling multiple tasks concurrently.
- Proficiency in project and time management.
- Ability to adjust to changing priorities.
- Ability to work in a cohesive team‑oriented environment.
- Must be a US Citizen able to obtain and maintain a Moderate Public Trust.
- Knowledge of DOC, NOAA, and NWS IT security policies and implementation standards or those of similar sized organizations and comprehensive understanding of NIST guidance including Special Publications and Federal Information Processing Standards.
- Self‑starter, highly motivated individual who adapts to a dynamic work environment.
- Strong attention to detail with an ability to operate effectively across multiple priorities.
Ideal for candidates with 5–7 years of hands‑on penetration testing experience who are looking to advance into intermediate‑level roles.
Duties- Protocol analysis, vulnerability discovery and exploitation, post‑exploitation impact analysis, and physical security.
- Highly technical problem‑solver who understands software architectures, security, communication protocols, virtualization, and hardware, and works with other engineers to resolve problems in design, development, and operations.
- Perform manual and automated firmware analysis on target devices.
- Perform pen tests, fuzzing and custom exploit attacks against client systems.
- Review deployment architectures, topologies and conops for compliance regulatory security mandates.
- Produce security reports suitable for submission to regulatory bodies.
- Conduct hands‑on technical testing beyond automated tool validation, including full exploitation and leveraging…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).