Open Systems Technologies
Sr. Infrastructure Penetration Tester/Researcher - Fort Lauderdale or Remote - 1
Open Systems Technologies, Fort Lauderdale, Florida, us, 33336
Sr. Infrastructure Penetration Tester/ResearcherDuration: Through Sep 2025Location: Fort Lauderdale - hybrid 2 days onsite/week if onsite OR for the right resource, Remote is ok
-Can have lighter penetration testing if strong scripting/coding and security tooling experience is deep (Python, Go, Bash, C++/C, Rust)-The tooling development and strength in areas like containerization/CI-CD are key for the success of this role
The Role:
The Senior Infrastructure Penetration Tester/Researcher plays a vital role in Client's Vulnerability Assessments (VA) team and is responsible for providing VA services to all Client businesses and technology teams globally. The position will be identifying weaknesses and vulnerabilities within the Client infrastructure and is part of a larger, global team that collectively provide VA support to all of Client's business groups. Commercial and open source Vulnerability Assessment tools and utilities are leveraged during these assessments.
Responsibilities
Provide Vulnerability Assessment/Penetration Testing services to Client businesses globally through a comprehensive testing process.Participate in special projects ranging from tooling and methodology development, advanced penetration testing as well as architecture reviews with sister teams to "shift-left".Serve as an SME for Infrastructure Penetration Testing with emerging tooling sets (Containerization, AI, CI/CD etc).Participate in the enhancement of testing processes and methodologies.Participate in building custom tooling aligned with strategic initiatives.Validation of the overall security of critical infrastructure components and applications to ensure they comply with internal policies, security architecture best practices, and industry standards.Scan systems and applications, leverage initial results to build a subsequent attack methodology and execute effectively.Report Information Security vulnerabilities to businesses in an actionable manner.
Qualifications
3-5 years' of relevant experience required in Offensive Security with a history of gradually expanding experience including network and overall infrastructure pentesting.Strong scripting/coding and security tooling experience (Python, Go, Bash, C++/C, Rust) (willing to discuss if knowledge here is deep and "pentesting" is light).Reverse Engineering / Exploit Development.Strong hands-on experience with Vulnerability Assessment/Enumeration tools, e.g., Tenable Nessus, Qualys VM, OSS enumeration tools.Demonstrate hands-on experience with penetration testing tools i.e. Kali suite, open-source tooling, Living Off The Land (OS), LOLBINS etc.Deep understanding of TCP/IP, Infrastructure stacks (i.e. 3 tier, segmented environments).Demonstrable experience working effectively in Enterprise environments.Understanding of defensive security principles with an ability to demonstrate offensive opportunities.OS and Network Security Experience, e.g. Unix, Linux, Windows, Cisco, etc.Understanding of common protocols, e.g. DNS, SMTP, SNMP, LDAP, Routing Protocols.Threat Mapping experience is a plus.Scripting (Bash, Python, etc.).Design experience/understanding on infrastructure/systems (enterprise a big plus).Exceptional interpersonal skills and a proven track record of working effectively with globally diverse teams.Ability to understand new and emerging technologies rapidly to keep up with an ever-changing threat landscape.Ability to effectively document and explain exploits/vulnerabilities to technical and non-technical audiences including senior leadership.Demonstrable proficiency in producing comprehensive penetration testing reports with actionable recommendations.
Education
Bachelor's Degree or equivalent work experience.OSCP, OSCE, GXPN, CREST preferred or similar demonstrable experience.
#J-18808-Ljbffr
-Can have lighter penetration testing if strong scripting/coding and security tooling experience is deep (Python, Go, Bash, C++/C, Rust)-The tooling development and strength in areas like containerization/CI-CD are key for the success of this role
The Role:
The Senior Infrastructure Penetration Tester/Researcher plays a vital role in Client's Vulnerability Assessments (VA) team and is responsible for providing VA services to all Client businesses and technology teams globally. The position will be identifying weaknesses and vulnerabilities within the Client infrastructure and is part of a larger, global team that collectively provide VA support to all of Client's business groups. Commercial and open source Vulnerability Assessment tools and utilities are leveraged during these assessments.
Responsibilities
Provide Vulnerability Assessment/Penetration Testing services to Client businesses globally through a comprehensive testing process.Participate in special projects ranging from tooling and methodology development, advanced penetration testing as well as architecture reviews with sister teams to "shift-left".Serve as an SME for Infrastructure Penetration Testing with emerging tooling sets (Containerization, AI, CI/CD etc).Participate in the enhancement of testing processes and methodologies.Participate in building custom tooling aligned with strategic initiatives.Validation of the overall security of critical infrastructure components and applications to ensure they comply with internal policies, security architecture best practices, and industry standards.Scan systems and applications, leverage initial results to build a subsequent attack methodology and execute effectively.Report Information Security vulnerabilities to businesses in an actionable manner.
Qualifications
3-5 years' of relevant experience required in Offensive Security with a history of gradually expanding experience including network and overall infrastructure pentesting.Strong scripting/coding and security tooling experience (Python, Go, Bash, C++/C, Rust) (willing to discuss if knowledge here is deep and "pentesting" is light).Reverse Engineering / Exploit Development.Strong hands-on experience with Vulnerability Assessment/Enumeration tools, e.g., Tenable Nessus, Qualys VM, OSS enumeration tools.Demonstrate hands-on experience with penetration testing tools i.e. Kali suite, open-source tooling, Living Off The Land (OS), LOLBINS etc.Deep understanding of TCP/IP, Infrastructure stacks (i.e. 3 tier, segmented environments).Demonstrable experience working effectively in Enterprise environments.Understanding of defensive security principles with an ability to demonstrate offensive opportunities.OS and Network Security Experience, e.g. Unix, Linux, Windows, Cisco, etc.Understanding of common protocols, e.g. DNS, SMTP, SNMP, LDAP, Routing Protocols.Threat Mapping experience is a plus.Scripting (Bash, Python, etc.).Design experience/understanding on infrastructure/systems (enterprise a big plus).Exceptional interpersonal skills and a proven track record of working effectively with globally diverse teams.Ability to understand new and emerging technologies rapidly to keep up with an ever-changing threat landscape.Ability to effectively document and explain exploits/vulnerabilities to technical and non-technical audiences including senior leadership.Demonstrable proficiency in producing comprehensive penetration testing reports with actionable recommendations.
Education
Bachelor's Degree or equivalent work experience.OSCP, OSCE, GXPN, CREST preferred or similar demonstrable experience.
#J-18808-Ljbffr