Conduct application and network layer penetration tests on various IT environments
Conduct red teaming activities, including physical security penetration testing
Perform independent pen testing utilizing numerous penetration testing tools and leveraging mainly manual techniques, typically testing will necessitate source code analysis
Write risk prioritized finding reports, debrief system owners and consult on remediation options
Retest security vulnerabilities that have been identified as fixed to verify remediation is effective
Contribute to pen testing, red teaming, tooling, and reporting methodology enhancements
Stay current on emerging technologies, pen testing tools and techniques, and security vulnerabilities
Evaluate effectiveness of defensive countermeasures and consult with blue teams to help improve detection methods and capabilities required for situational awareness
Requirements
3+ years of experience with server administration and file management structure
3+ years of experience with programming experience in Python, PHP, Perl, Ruby, .NET, or other interpreted or compiled languages
1+ years of experience in penetrating testing and vulnerability assessments using manual techniques and vulnerability testing tools (including scanners, sniffers, fuzzers and exploit tools such as Burp, Nmap, Kali and Metasploit)
Bachelor’s degree or higher (preferred)
Security professional certifications (e.g. Offensive Security Certified Professional (OSCP), Global Information Assurance Certification (GIAC), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP)) (preferred)
Experience working in Information/Cybersecurity identifying security vulnerabilities (preferred)
Experience with secure software development lifecycle and large-scale computing environments (preferred)
Experience working with Information Security principles, policies, and industry best practices including the Critical Security Controls (CIS), Open Worldwide Application Security Project (OWASP), Top 10 and Mitre Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework (preferred)
Experience working with Authentication and Authorization Controls (preferred)
Experience working with common server applications such as Internet Information Services (IIS), Apache, Lightweight Directory Access Protocol (LDAP), Tomcat, and Secure Shell (SSH) (preferred)
Experience working with common network protocols such as HyperText Transfer Protocol/ HyperText Transfer Protocol Secure (HTTP/HTTPS), Transmission Control Protocol/Internet Protocol (TCP/IP), and User Diagram Protocol (UDP) (preferred)
Experience conducting technical research (preferred)
Experience with cloud-based architectures (preferred)
Experience working with strong written and verbal communication skills (preferred)
Experience growing technical skills and participating in the broader Boeing Information Security community (preferred)