The job below is no longer available.

You might also like

in Indianapolis, IN

Use left and right arrow keys to navigate
Hours Full-time, Part-time
Location Indianapolis, Indiana

About this job


Category Cybersecurity Services
Type Regular Full-Time

Overview

MITSec's mission is to improve the security posture of client organizations by providing detection, response, risk management, and compliance services as identified and required. MITSec will implement processes, technology, and provide subject matter expert personnel to monitor and respond to client needs in the cybersecurity and compliance space. Working with client organizations, MITSec will continuously measure and improve internal processes and technology, which will translate to improved services provided to the client.

MITSec is seeking team members to fill the role of Offensive Cybersecurity Engineer, at different levels. Individuals will have the opportunity to join at all levels based on their knowledge and skills demonstrated during the interview process including testing. MITSec has developed a career progression path, that challenges our team to grow as cybersecurity professionals with solid offensive cybersecurity knowledge and providing excellent customer service with ongoing audits and assessments as a member of the MITSec - Services team

What you will be doing as a Penetration Tester, collaborate to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

The role of the Penetration Tester is challenging and rewarding. It requires a business acumen and effective communication skill set. The ability to communicate highly technical concepts to non-technical users is critical to client success. There may be an opportunity to mentor other Penetration Tester as needed.


Responsibilities

Associate Penetration Tester

  • Conduct and/or support authorized penetration testing on enterprise network assets.
  • Apply and utilize authorized cyber capabilities to enable access to targeted networks.
  • Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements.
  • Apply and obey applicable statutes, laws, regulations and policies.
  • Collaborate with other internal and external partner organizations on target access and operational issues.
  • Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers.
  • Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.
  • Profile network or system administrators and their activities.

Core Penetration Tester (In addition to the above tasks)

  • Perform analysis for target infrastructure exploitation activities.
  • Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access.
  • Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.
  • Examine intercept-related metadata and content with an understanding of targeting significance.
  • Identify gaps in our understanding of target technology and developing innovative collection approaches.
  • Lead or enable exploitation operations in support of organization objectives and target requirements.
  • Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.
  • Produce network reconstructions.

Senior Penetration Tester (In addition to the above tasks)

  • Perform penetration testing as required for new or updated applications.
  • Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development.
  • Monitor target networks to provide indications and warning of target communications changes or processing failures.

Things We Are Looking For
Knowledge

Associate Penetration Tester must demonstrate a basic understanding of the below:

  • Client organizations, including information needs, objectives, structure, capabilities, etc.
  • Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).
  • Computer networking concepts and protocols, and network security methodologies.
  • Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Cybersecurity and privacy principles.
  • Cyber threats and vulnerabilities.
  • Concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
  • Web mail collection, searching/analyzing techniques, tools, and cookies.
  • Collection management processes, capabilities, and limitations.
  • Front-end collection systems, including traffic collection, filtering, and selection.
  • MITRE ATT&ACK stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • System administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
  • Applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.
  • Relevant reporting and dissemination procedures.
  • Attack methods and techniques (DDoS, brute force, spoofing, etc.).
  • Implants that enable cyber collection and/or preparation activities.
  • Common networking devices and their configurations.
  • Common reporting databases and tools.
  • Security concepts in operating systems (e.g., Linux, Unix.)
  • Data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
  • How Internet applications work (SMTP email, web-based email, chat clients, VOIP).
  • How to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).
  • Identification and reporting processes.
  • Internet and routing protocols.
  • Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
  • Intrusion sets.
  • midpoint collection (process, objectives, organization, targets, etc.).
  • Network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
  • Network topology.
  • Products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities.
  • Scripting
  • Strategies and tools for target research.
  • Target intelligence gathering and operational preparation techniques and life cycles..

Core Penetration Tester must demonstrate an advanced understanding of the above with intermediate knowledge of the below:

  • Risk management processes (e.g., methods for assessing and mitigating risk).
  • Specific operational impacts of cybersecurity lapses.
  • Website types, administration, functions, and content management system (CMS).
  • Principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis).
  • Internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.
  • Collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.
  • Data flow process for terminal or environment collection.
  • Organizational and partner authorities, responsibilities, and contributions to achieving objectives.
  • Organizational and partner policies, tools, capabilities, and procedures.
  • Terminal or environmental collection (process, objectives, organization, targets, etc.).
  • Basic structure, architecture, and design of converged applications.
  • Basic structure, architecture, and design of modern communication networks.

Senior Penetration Tester must demonstrate an expert understanding of the above with advanced understanding of the below:

  • Knowledge of evasion strategies and techniques.
Skills

Associate Penetration Tester

  • Evaluating accesses for intelligence value.
  • Interpreting compiled and interpretive programming languages.
  • Analyzing traffic to identify network devices.
  • Creating and extracting important information from packet captures.
  • Creating collection requirements in support of data acquisition activities.
  • Identifying the devices that work at each level of protocol models.
  • Interpreting metadata and content as applied by collection systems.
  • Navigating network visualization software.
  • Recognizing and interpreting malicious network activity in traffic.
  • Recognizing midpoint opportunities and essential information.
  • Recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, mail servers, domain servers, SMTP header information).
  • Researching vulnerabilities and exploits utilized in traffic.
  • Using databases to identify target-relevant information.
  • Using trace route tools and interpreting the results as they apply to network analysis and reconstruction.
  • Writing (and submitting) requirements to meet gaps in technical capabilities.

Core Penetration Tester

  • Identifying gaps in technical capabilities.
  • Depicting source or collateral data on a network map.
  • Determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments.
  • Generating operation plans in support of mission and target requirements.
  • Target development in direct support of collection operations.
  • Using non-attributable networks.

Senior Penetration Tester

  • Creating plans in support of remote operations. (i.e., hot/warm/cold/alternative sites, disaster recovery).
Abilities

Associate Penetration Tester

  • Accurately and completely source all data used in intelligence, assessment and/or planning products.
  • Collaborate effectively with others.
  • Expand network access by conducting target analysis and collection to identify targets of interest.
  • Identify/describe target vulnerability.
  • Have or attain eJPT or equivalent certification within 8 months of employment.

Core Penetration Tester

  • Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • Evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
  • Identify/describe techniques/methods for conducting technical exploitation of the target.
  • Select the appropriate implant to achieve operational goals.
  • Have or attain OSCP or equivalent (ex. GPEN) certification within 6 months of employment.

Senior Penetration Tester

  • Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
  • Have or attain OSEP or equivalent (ex. GXPN) certification within 6 months of employment.
Other Desired Attributes
  • Certifications include, but not limited to specialized penetration testing certifications recognized to text web application, mobile device, WiFi, and cloud.
  • Public Trust background check (Limited Requirement)
  • Must be able to do some light lifting
  • College degrees may be a substitute for up to two years experience for Bachelor's degrees. 4 Years for master's degrees.

NOTE: EC-Council certifications will not be considered as having met requirements for KSA.