- CGI Technologies and Solutions, Inc. (Fort Belvoir, VA)
- …o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance ... and a proven track record in vulnerability assessment and penetration testing. With expertise in cybersecurity software tools and...Certification Penetration Tester (GPEN) Minimum Experience: . Seven (7) years IT… more
- CGI Technologies and Solutions, Inc. (Fort Belvoir, VA)
- …o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance ... Additional Qualifications: * Proven proficiency performing CCRI/ vulnerability assessment/ penetration testing on networks, databases, computer applications and IT...Certification Penetration Tester (GPEN) CGI is required by law in some… more
- Rigid Tactical (Norfolk, VA)
- …government. + Offensive Security Certified Professional (OSCP) + GIAC Certified Penetration Tester (GPEN) + Certified Ethical Hacker (CEH) Practical (or ... Master) + Cisco Certified Network Professional (CCNP Security) + GIAC Exploit Developer (GXPN) + Certified Red Team Expert (CRTE) Key Responsibilities: The Exploitation Analyst role is a Key Personnel position with an advanced focus on planning and executing… more
- Imagine One Technology & Management (Dahlgren, VA)
- …tools: 1. Kali, Metasploit, NMAP, Cobalt Strike 2. Associated Training: Certified Ethical Hacker or Offensive Security Certified Professional and; 3. Documented ... per DoD 8570.01, or successor. + Minimum certification as penetration tester and possess one of the...Wireless Professional (OSWP) 2. SANS Certs: SEC560 - Network Penetration testing and Ethical Hacking (GPEN Certification),… more
- Cengage Group (Virginia Beach, VA)
- …Professional) + CCSP (Certified Cloud Security Professional) + CEH (Certified Ethical Hacker ) + CPT (Certified Penetration Tester ) + CISM (Certified ... of information security best practices including: encryption, application security, penetration testing, and computer forensics + Ability to evaluate, design,… more