Application Penetration Tester 3 Job at Akkodis, Washington DC

ekVmQmtiN0lNUjczbGNwYjdkR3luYm44eGc9PQ==
  • Akkodis
  • Washington DC

Job Description

Role: Application Penetration Tester 3

Duration: Direct hire – onsite

Pay Range: $120,000 - $160,000 per year

Location: Washington DC

Remote Status: onsite -hybrid

Job Overview:

seeking a skilled Penetration Tester II with 3+ years of hands-on experience in offensive security to join our growing team. The ideal candidate is highly skilled in adversary emulation, has excellent communication skills, and is capable of scoping and executing sophisticated attacks in diverse and complex environments.

The Penetration Tester II will be required to conduct advanced operations, simulating real-world adversaries to challenge organizational security defenses, secure code development practices, and application security models. The successful candidate will be required to perform targeted technical assessments across a wide range of assets to include but not limited to:

  • Web and mobile applications (iOS, Android)
  • Cloud platforms (e.g., AWS, OCI, Azure, GCP)
  • Containerized environments (e.g., Docker, Kubernetes)
  • Network perimeter and internal infrastructure

To perform comprehensive testing, the candidate will work within a collaborative and team-oriented environment where they are expected to develop and deploy custom tools, exploits, and payloads to bypass controls and evade detection, map adversarial tradecraft (e.g., MITRE ATT&CK tactics) and replicate techniques used by threat actors in realistic scenarios and leverage offensive security tooling to conduct assessments and document findings clearly and concisely for both technical and non-technical audiences, providing actionable remediation guidance.

Primary Responsibilities:

  • Conduct comprehensive security assessments including but not limited to penetration testing, infrastructure vulnerability assessments, systems audits and validating security controls.
  • Plan and execute technical testing/assessments of web and mobile applications, containers, and cloud infrastructure, leveraging testing methods and frameworks such as DAST, OWASP Top Ten, and OWASP ZAP.
  • Triage, peer review, publish, and communicate findings and recommendations to client stakeholders.
  • Leverage automated security testing and monitoring such as integrating CI/CD pipelines.
  • Validate security controls around web resources and mobile applications and their backend web services.
  • Develop comprehensive and accurate reports and presentations for varied stakeholders.
  • Utilize adversarial tradecraft and cyber threat intelligence to design, emulate, and execute realistic assessments, employing both specialized and emerging techniques.
  • Perform innovative research and promote an environment of innovation and knowledge sharing.
  • Design and propose new penetration assessments based on prior findings and understanding of client infrastructure.
  • Custom malware and exploit development.
  • Develop/modify custom tooling or processes to solve or improve identified assessment or program needs.
  • Other program operational or project initiatives to be assigned.

Minimum Qualifications:

  • 3+ years of experience performing red team penetration tests/operations or equivalent experience (e.g. 5+ years designing web or mobile applications, with less than 3 years of experience in penetration testing, red team emulation, blue team or purple team operations or similar combination of relevant experience).
  • Experience with Windows and Nix systems.
  • Experience with reading, writing, and editing code written in various programming languages, such as Perl, Python, Ruby, Bash, C/C++, C#, and Java.
  • Proficiency in DAST tools like Nessus, Burp Suite, OWASP ZAP, Netsparker, Acunetix, Chechmarx, Fortify WebInspect, VeraCode, ZAP, Intruder, Detectify, Corellium, Synopsys, ReadyAPI, and Jit.
  • Proficiency in offensive cyber tooling such as Empire, Bloodhound, Nmap, Wireshark, Metasploit, BeEF, SQLMap, John the Ripper, Fuzzing tools, Netcat, Hydra, etc.

Preferred Qualifications:

  • Experience with conducting reverse engineering on mobile applications, including applications with anti-emulator and obfuscation protections.
  • Experience with Docker and Kubernetes security.
  • Experience or familiarity with cloud security practices or penetration tests (AWS, Azure, Oracle).
  • Holds at least one industry standard certification such as GWAPT, OSCP, GCIH, GPEN, GXPN, CRTE, CRTP, CEPT, GCPN, eWPT, CASE, GX-IH, GRTP, GPYC, and CRTO.
  • Active contributions to the security community such as research, public CVEs, bug-bounty recognitions, open-source projects, blogs, publications, conferences, etc.
  • Experience with iOS and Android operating systems.
  • Experience with securing and testing API vulnerabilities.
  • Leverage proof of concept code to build or tailor exploits.
  • DevOps Experience: GitLab, GitLab CI, Docker Buildkit, docker-compose, cross-compilation toolchains, build systems.
  • Knowledge of regulatory requirements and industry standards (e.g. GDPR, PCI-DSS).

Eligibility Requirement:

Applicants must currently reside in the United States and be authorized to work in the U.S. without the need for current or future visa sponsorship.

Job Tags

Remote job, Visa sponsorship,

Similar Jobs

Luxury Bath Technologies

Field Canvasser Job at Luxury Bath Technologies

 ...Field Canvasser $18/hr Base Pay + Unlimited Bonuses Join our Growing Team at Optum Home Solutions! Optum Home Solutions is a leader in custom acrylic bath remodeling, helping homeowners transform their bathrooms into beautiful, durable, low-maintenance spaces. We... 

Hanwha Convergence USA

O & M Field Tech II - Solar Field Job at Hanwha Convergence USA

As a subsidiary of Hanwha Energy, a global energy solutions company, Hanwha Convergence USA Corp. provides reliable Smart Factory Solution, Factory Automation, and renewable energy O&M (Operations and Maintenance) services to semi-conductor manufacturing as well as solar...

K3-Innovations, Inc.

Electronic Data Interchange Analyst Job at K3-Innovations, Inc.

 ...Opportunities for EDI Analyst I, II, and Task Leader Location: Within Chicago City Limits Federal Government Contract Key Duties Data Collection: Gather information from various sources, such as surveys, databases, and economic indicators. Aggregate data... 

The Calendar Group

Live-in Governess Job at The Calendar Group

 ...educated, experienced, and truly exceptional live-in nanny. This is a great opportunity to join a warm and appreciative household, providing enriching care for eager-to-learn 5-year-old twins. The ideal candidate will be a positive, highly organized, and dedicated... 

B. Braun US Pharmaceutical Manufacturing LLC

Project Engineer Job at B. Braun US Pharmaceutical Manufacturing LLC

 ...more about B. Braun Medical, visit Position Summary: This position will be responsible for providing control system engineering support to troubleshoot, maintain and improvement projects of Automation and Controls systems for the Automated Equipment in a dynamic...