Consultant, Attack & Penetration

Full Time
Denver, CO
Areas of Interest: Vulnerability Assessment and Management
report a problem
Feature
Virtual / Telecommute
Remote work is frequently a way to describe working from a home office or being a telecommuter. Depending on the job and company, remote work offers the ability to work from anywhere in the world. To do a remote job, professionals need access to tools like phone/internet service and a quiet place to work without distraction.
Overview

 

Created in 2015 from the merger of Accuvant and FishNet Security, Optiv is the largest holistic pure-play cyber security solutions provider in North America. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Learn more on www.optiv.com.

Job Description
POSITION SUMMARY

An Attack & Penetration Consultant is a highly skilled penetration tester capable of performing complex assessments while maintaining a business focus and meeting client requirements. This position will work both independently and as part of a team to perform Security Assessments including: vulnerability assessments, penetration tests, wireless security assessments and social engineering. An Attack & Penetration Consultant also contributes to the development and continuous improvement of the Security Assessment practice through various team and industry contributions.

LOCATION
Virtual based position 

  • Assess an organization’s network security posture through the use of automated tools and manual techniques to identify and verify common security vulnerabilities
  • Use creative approaches to identify vulnerabilities that are commonly missed in security assessments
  • Exploit vulnerabilities and identify specific, meaningful risks to clients based on industry and business focus
  • Perform complex wireless attacks both against wireless clients and access points
  • Use social engineering techniques to obtain sensitive information, network access and physical access to client sites
  • Assess physical security controls by lock picking, camera evasion, tailgating, dumpster diving and other evasive techniques
  • Execute opportunistic, blended and chained attack scenarios that combine multiple weaknesses to compromise client environments
  • Create comprehensive assessment reports that clearly identify root cause and remediation strategies
  • Interface with client personnel to gather information, clarify scope and investigate security controls
  • Execute projects using established methodology, tools and documentation
  • Collaborate with other team members and practices to complete client projects and practice contributions
  • Maintain industry credentials/certifications
  • Participate in industry conferences to include delivering presentations
  • Provide support in the ongoing development of security assessment offerings through tool creation and process improvement
  • Perform other duties as assigned

Qualifications

  • Minimum two (2) years of experience performing Vulnerability Assessments, Penetration Tests, Wireless Security Assessments and and/or Social Engineering to enterprise-level organizations
  • Minimum three (3) years of experience in a consulting services role, or related information security positions
  • Ability to travel 25-40% of the time to client sites
  • Bachelor’s Degree from a four-year college or university in Information Assurance, Computer Science, Management Information Systems or related area of study; or related experience and/or training; or equivalent combination of education and experience
  • OSCP, OSCE, GIAC, CISSP certifications strongly preferred
  • Demonstrated ability to deliver projects using well-defined methodology across various security assessment disciplines including:
  • Network Vulnerability Assessments
  • Penetration Tests
  • Wireless Network Security Assessments
  • Social Engineering (Telephony, onsite and remote pre-texting, spear phishing, etc.)
  • Physical Security Assessments (Tailgating, lock picking, camera evasion, dumpster diving, etc.)
  • VoIP Security & War Dialing
  • Product/Hardware Security Assessments
  • Web application Vulnerability Assessments (SQLi, XSS, Session management issues, etc.)
  • Ability to combine multiple separate findings to identify complex blended vulnerabilities
  • Ability to identify, describe and report vulnerabilities and standard remediation activities, to include clear demonstration of risk to clients through post-exploitation activities required.
  • Mastery of commercial and open source security tools required (e.g. Nessus, Nexpose, SAINT, Qualys, Burp, Nmap, Kali, Metasploit, Meterpreter, Wireshark, Kismet, Aircrack-ng etc.)
  • Familiarity with many different network architectures, network services, system types, network devices, development platforms and software suites required (e.g. Linux, Windows, Cisco, Oracle, Active Directory, JBoss, .NET, etc.) required.
  • Demonstrated ability to create comprehensive assessment reports required.
  • Must be able to work well with customers and self-manage through difficult situations, focus on client satisfaction.
  • Ability to convey complex technical security concepts to technical and non-technical audiences including executives required.
  • Ability to work both independently as well as on teams required.
  • Ability to lead and mentor others required; willingness to collaborate and share knowledge with team members required.
  • Proven ability to review and revise reports written by peers required.
  • Experienced at writing technical proposals, statements of work, white papers, presentations and project documentation; strong attention to detail is required.
  • Demonstrated effective time management skills, ability to balance multiple projects simultaneously and the ability to take on large and complex projects with little or no supervision required.
  • Motivation to constantly improve processes and methodologies required.
  • Passion for creating tools and automation to make common tasks more efficient required.
  • Knowledge of programming and scripting for development of security tools required.
  • Ability to deliver presentations at industry conferences, write blog posts required.
  • Project management experience preferred.
  • Recognition in the security community for speaking preferred.
  • Published white papers preferred.
  • Strong programming skills preferred (Python, Ruby, Node.js, C/C++, Assembly, etc.)
  • Reverse engineering/Binary analysis experience (firmware, x86 applications, etc.) preferred.
DISCLOSURE
Optiv is an Equal Opportunity Employee/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, gender, national origin, age, disability or veteran status.
 
ABOUT US
Created from the merger of Accuvant and FishNet Security, Optiv is the largest comprehensive pure-play cyber security solutions provider in North America. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. A Blackstone (NYSE: BX) portfolio company, we have served more than 12,000 clients of various sizes

Why Work Here:
At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest growing companies in a truly essential industry.
 
In your role at Optiv, you’ll be inspired by a team of the brightest business and technical minds in cyber security. We are passionate champions for our clients, and know from experience that the best solutions for our clients’ needs come from working hard together. As part of our team, your voice matters, and you will do important work that has impact, on people, businesses and nations. Our industry and our company move fast, and you can be sure that you will always have room to learn and grow. We’re proud of our team and the important work we do to build confidence for a more connected world.
 
About Optiv
  • $2 billion in sales in 2015
  • More than 7,500+ clients served in the past three years
  • Works with 69 percent of the Fortune 100 and 58 percent of the Fortune 1000
  • 1,700+ employees
  • More than 250 employees in Colorado (corporate headquarters in Denver, CO)
  • Nearly 400 employees in Kansas City
  • 300+ dedicated client managers (sales reps)
  • 1,200+ cyber security experts
  • 43 total offices, secure operating centers and training centers 
Benefits Highlights
  • Competitive and achievable bonus plan (for some roles)
  • Remote work possibilities and flexible schedules
  • Flexible, no time tracking vacation policy that lets you take the time you need, when you need it
  • 401k retirement savings match
  • Comprehensive medical, vision and dental coverage
 
Optiv is an Equal Opportunity Employer. We are committed to a work environment where everyone is treated with respect. It is our policy to recruit, employ, retain, promote, terminate and otherwise treat any and all employees and job applicants on the basis of merit, qualifications and competence. We will provide equal employment opportunities without regard to race, color, age, sex, religion, national origin, disability, military or veteran status, sexual orientation, gender identity or expression, marital status, genetic information, or any other legally protected status or characteristic.

We will also take affirmative action as called for by applicable laws and executive orders to ensure that minority group individuals, females, disabled veterans, recently separated veterans, other protected veterans, Armed Forces Service Medal veterans, and qualified disabled persons are introduced into our workforce and considered for promotional opportunities.

This policy prohibits retaliation or adverse employment action against anyone who exercises his or her rights under this policy or any anti-discrimination law, who cooperates in any company investigation, or who participates in any investigation or proceeding by any governmental agency.



Share this job:

OPTIV

Unmatched Experience, Know-How and Partnerships in Cyber Security. The Power of Accuvant and FishNet Security Combined
Created in 2015 from the merger of Accuvant and FishNet Security, Optiv is the largest holistic pure-play cyber security solutions provider in North America. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. A Blackstone (NYSE: BX) portfolio company, we have served more than 12,000 clients of various sizes across multiple industries, offer an extensive geographic footprint, and have premium partnerships with more than 300 of the leading security technology manufacturers. For more information, visitwww.optiv.com or follow us on TwitterFacebook or LinkedIn.
Visit OPTIV's Social Media pages:
Company Industry: Computer & Network Security
Company Type: Privately Held
Company Size: 1,001-5000
One other job with this company: