Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
🤖 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

CACI • Virginia, United States
Salary: $113,200 - $237,800 / year
Role & seniority
Stack/tools
Pen testing frameworks and tools: Metasploit Framework, Burp Suite, Cobalt Strike, Kali Linux, PowerShell Empire, Canvas
Platforms: Windows (Active Directory), Linux, ESXi; mobile platforms a plus
Networking/cloud: TCP/IP, virtualization, cloud/data center architecture
Scripting: Bash, Python, PowerShell, Perl/Ruby; systems programming a plus
Other: A/V evasion methods, DoD/NSA vuln/pen tests, OWASP Top 10
Top 3 responsibilities
Conduct red team security assessments and penetration testing within a Cyber Operations environment
Perform grey/black box testing and exploit development across programs; simulate real-world threats
Engage in cyber events/training (e.g., Capture the Flag), contribute to continuous improvement of testing methodologies
Must-have skills
Active TS/SCI with polygraph clearance
Proven red team and blue team operations experience
Real-world grey/black box pentesting; strong knowledge of web app vulnerabilities (XSS, SQLi, CSRF, etc.)
Proficient with key tools (Metasploit, Burp Suite, Cobalt Strike, Kali, A/V evasion, IPTables, Sysinternals)
Solid Windows (incl. Active Directory) and Linux expertise; networking, virtualization, and cloud familiarity
Certifications: OSCP/OSCE/GPEN/GWAPT/GPEN, CEH, CISSP, etc.
Malware analysis or digital forensics experience; DoD/NSA standards knowledge is a plus
Nice-to-haves
Job Title: Penetration Tester
Job Category: Engineering
Time Type: Full time
Minimum Clearance Required to Start: TS/SCI with Polygraph
Employee Type: Regular
Percentage of Travel Required: None
Type of Travel: None
Must be proficient in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, Kali Linux, IPTables, Sysinternals, A/V evasion methodologies, Exploit Dev. Must have solid working experience and knowledge of Windows operating systems (incl. Active Directory), Linux operating systems; ESXi or similar; mobile platforms are a plus. Solid understanding of networking, TCP/IP, virtualization and cloud/data center architecture.
Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards. Knowledge of exploitation concepts including phishing and social engineering tactics, buffer overflows, fuzzing, SQLi, MiTM, covert channels, secure tunneling and open source exfiltration techniques. Bachelors degree in related field. Active TS/SCI w/polygraph clearance. This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.