Work with a wide variety of clients, including Fortune 100 companies, to validate security controls and incident response through offensive security operations, including Red and Purple Teaming. Interface directly with client leadership and technical security staff to lead Red and Purple team engagements in a wide variety of scenarios ranging from phishing based initial access to OT ICS network perimeter and egress testing. Work with a team of 10+ seasoned security testing professionals to enhance existing services offerings and security testing capabilities and conduct hands on technical testing focused on detection and response that necessitates continuously customized tooling to avoid AV, EDR, and other protection technologies. Conduct full exploitation and leveraging of access within multiple environments, including complex Active Directory and mixed Windows and nix environment. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Identify and communicate findings and strategy effectively to client stakeholders, including technical staff, executive leadership, and legal counsel. Apply security testing and penetration testing techniques and mindset to a wide range of projects, become part of a team of security enthusiasts that perform cutting-edge research, and promote an environment of innovation and knowledge-sharing. This position is open to remote delivery anywhere within the U.S., to include the District of Columbia.
5+ years of experience with conducting offensive security testing
Experience with conducting Red or Purple teaming exercises
Experience with using, administering, and troubleshooting, including Kali and Ubuntu as an attack platform
Experience working in a Windows environment and with Active Directory attack path enumeration
Experience with social engineering tactics, including phishing
Experience with scripting and editing existing code and programming, including Python, Bash, C, C++, .NET, or Java
Experience with developing, extending, or modifying exploits, shellcode, or exploit tools
Experience with C2 frameworks, including Cobalt Strike, Covenant, or Sliver
Knowledge of network vulnerability assessments, Web application security testing, network penetration testing, red teaming, security operations, or hunt
Experience with working in a commercial consulting or professional services environment
Experience with assembly languages, including x86 or reverse engineering
Experience deploying attacker infrastructure in cloud environments
Experience in network penetration testing and manipulation of network infrastructure.
Experience in mobile or web application assessments.
The proposed salary range for this position in Colorado is 110,000 to 150,000. Final salary will be determined based on various factors.
At Booz Allen, we celebrate your contributions, provide you with opportunities and choice, and support your total well-being. Our comprehensive benefit offerings include healthcare, retirement plan, insurance programs, commuter program, employee assistance program, paid and unpaid leave programs, education assistance, and childcare benefits.
We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.#LI-AH1