Search

Application Penetration Tester - Government

ZIRLEN TECHNOLOGIES INCORPORATED
locationMontpelier, VT 05602, USA
PublishedPublished: 6/14/2022
Technology
Full Time

Job Description

Job DescriptionApplication Penetration Tester - Government
Position- Contract - Remote (Vermont)

Required:

  • Hands-on experience in application penetration testing
  • Ability to identify, validate, and document security vulnerabilities
  • Experience performing vulnerability re-testing after remediation
  • Strong understanding of authentication, authorization, and role-based access controls
  • Proficiency in analyzing application endpoints, workflows, and data flows
  • Strong written communication skills for producing detailed technical reports
  • Ability to use penetration testing tools for logging, packet tracing, and evidence collection

Preferred Skills

  • Experience performing penetration testing in government or regulated environments
  • Familiarity with vendor-hosted or cloud-hosted application security testing
  • Skill in assessing complex application architectures and multi-role access models
  • Ability to provide detailed remediation guidance based on findings
  • Advanced reporting skills with clear risk ranking and reproducible steps
  • Professional certifications such as OSCP, CEH, GPEN, or PenTest+ (preferred but not required)

Specific Skills:

  • Web and application penetration testing expertise
  • Ability to test authenticated user roles and access control paths
  • Strong vulnerability identification, exploitation, and impact assessment skills
  • Proficiency in packet tracing, traffic analysis, and log review
  • Ability to clearly document findings with screenshots, evidence, and reproduction steps
  • Strong understanding of common security flaws (OWASP Top 10, access control weaknesses, session.

If you are interested, please share your updated resume with your contact number to sivarajan.s@zirlen.com, and also feel free to reach out at 972-433-6033 Ext. 1005.

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...