S

Penetration Tester - TS/SCI w/ Polygraph

Sunayu Annapolis Junction, Maryland, United States

remote
Posted Nov 11, 2025

Role & seniority: Lead Penetration Tester on an agile SAFe program; senior/lead capabilities with security architecture SME responsibilities

Stack/tools: Burp Suite, WebInspect, AppDetective; Kali Linux; web tech: Java, XML, Perl, HTML; scripting/programming: Python, PowerShell, C, JavaScript; IAM/IPS/IDS; RMF; Cyber Kill Chain

Top 3 responsibilities

  • Perform internal/external and web app penetration tests; conduct vulnerability risk assessments; identify, remediate, and coordinate mitigations

  • Conduct physical pentests and social engineering analyses; support cyber incident response; assess impact of new development on security posture

  • Verify security configurations; audit/system hardening; collaborate with Dev, Test, and System Engineering to enforce security requirements and policies

Must-have skills

  • Experience with penetration testing tools and web app pentests; strong programming/scripting in Python, PowerShell, C, JavaScript; Java/XML/HTML

  • Proficiency with Burp Suite, WebInspect, AppDetective; familiarity with Kali; knowledge of IPS/IDS; understanding of Cyber Kill Chain and RMF

  • Ability to manage multiple projects, shift priorities, and collaborate with technical teams and customers

Nice-to-haves

  • Bachelor’s degree in technical/information assurance; 12+ years relevant experience

  • Certifications: GWAPT, GPEN, CEH, CISM, GWEB, CISSP; experience implementing security services management, risk analysis, incident response

  • Location

Full Description

Location: Annapolis Junction, MD

Category: Penetration Tester

Travel Required: No

Remote Type: No

Clearance: TS/SCI w/ Polygraph

Penetration Tester

A Lead Penetration Tester is needed to join a high performing agile team using the Scaled Agile Framework (SAFe) methodology on a large, complex program that provides system engineering, development, test, integration and operational support. The selected individual will work on a team of cyber Subject Matter Experts (SMEs) who are providing support to a large, complex technical program for preventing, identifying, containing and eradicating cyber threats to networks through monitoring, intrusion detection, and protective security services on information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connections, public facing websites, security devices, servers and workstations. She/he will be responsible for the overall security of Enterprise-wide information systems, and will collect, investigate, and report any suspected and confirmed security violations. Primary Responsibilities Perform internal and external pentests against systems to determine vulnerabilities and develop mitigation strategies. Perform web app pentests. Perform vulnerability risk assessments. Perform physical pentests and social engineering analysis. Perform cyber incident response as needed. Evaluate the impact of new development on the operational security posture of IT systems. Evaluate, review, and test critical software. Formulate security compliance requirements for new system features. Identify and remediate security issues throughout the system. Audit and assess system security configuration settings using common methodologies and tools. Work with development teams to enrich team-wide understanding of different types of vulnerabilities, attack vectors, and remediation approaches. Work closely with System Engineering, Test Engineering, and Integration teams to ensure hardware and software architecture and implementations meet strict security requirements. Propose, assess, coordinate, implement, and enforce information systems security policies, standards, and methodologies. Serve as a Subject Matter Expert in security architecture, to include providing advice to Program Managers, Customer technical experts, and internal program teams.

Basic Qualifications Must have experience with penetration testing tools. Must have experience in web development and programming languages such as Java, XML, Perl and HTML. Must have experience with programming/scripting in Python, Powershell, C, JavaScript, etc. Must have extensive experience performing IT security risk assessments. Must have experience performing web app and physical pentests. Must have experience with or strong familiarity of the following Web Application tools; Burp Suite, Web Inspect, Appdetective. Must have experience with or strong familiarity of Kali. Must have experience with or strong familiarity of IPS/IDS solutions. Must have a strong understanding of the Cyber Kill Chain methodology. Must have experience applying Risk Management Framework. Must have experience with secure configurations of commonly used desktop and server operating systems. Must have the ability to effectively collaborate with technical staff and customers to form mitigation strategies and plan for continuous modernization and legacy integration. Must have experience managing multiple projects simultaneously and quickly and effectively adjusting to shifting priorities in resolving issues.

Preferred Qualifications Bachelor's degree in a technical/information assurance field and at least 12 years of relevant experience.

Certifications in one or more of the following areas strongly preferred

  • GIAC Web Applications Penetration Tester (GWAPT)
  • GIAC Penetration Tester (GPEN)
  • Certified Ethical Hacker (CEH)
  • Certified Information Security Manager (CISM)
  • Certified Web Application Defender (GWEB)
  • Certified Information System Security Professional (CISSP)
  • Extensive experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response.
  • Extensive experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass development, design, and implementation.​
Penetration TestingWeb DevelopmentProgramming LanguagesPythonPowershellCJavaScriptIT Security Risk AssessmentsWeb App PentestsPhysical PentestsCyber Incident ResponseSecurity ComplianceSystem Security ConfigurationCollaborationProject ManagementCyber Kill Chainmulti-location

Cookies & analytics consent

We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.

Read how we use data in our Privacy Policy and Terms of Service.