About this role
Perform adversarial security testing and penetration testing across Boeing IT environments as part of the Enterprise Security Red Team. You will use manual techniques, PoC and exploitation, produce risk-prioritized reporting, and coordinate remediation verification with system owners and blue teams.
Key Responsibilities
- Conduct application and network layer penetration tests and red teaming activities,Perform independent pen testing using tools and mainly manual techniques with source code analysis,Write risk prioritized finding reports and debrief system owners on remediation options,Retest vulnerabilities after fixes to verify remediation effectiveness,Evaluate defensive countermeasures and consult with blue teams to improve detection and situational awareness
Technical Overview
The role focuses on application and network penetration testing, red teaming including physical security penetration testing, and vulnerability assessments using manual methods. You will leverage tools such as Burp, Nmap, Kali, and Metasploit, and often require source code analysis to support testing and exploitation.
Ideal Candidate
The ideal candidate is a mid-level cybersecurity assessment specialist with 3+ years of server administration and 3+ years of programming experience in Python, PHP, Perl, Ruby, or .NET. They have 1+ years of hands-on penetration testing and vulnerability assessments using manual techniques and tools like Burp, Nmap, Kali, and Metasploit, with experience writing risk-prioritized findings and coordinating remediation with system owners.
Must-Have Skills
3+ years of experience with server administration and file management structure3+ years of experience with programming experience in PythonPHPPerlRuby.NETor other interpreted or compiled languages1+ years of experience in penetrating testing and vulnerability assessments using manual techniques and vulnerability testing tools (including scannerssniffersfuzzers and exploit tools such as BurpNmapKali and Metasploit)
Nice-to-Have Skills
3+ years of experience working in Information/Cybersecurity identifying security vulnerabilitiesexperience with secure software development lifecycle and large-scale computing environmentsexperience working with Information Security principlespoliciesand industry best practices including the Critical Security Controls (CIS)
Tools & Platforms
BurpNmapKaliMetasploit
Required Skills
adversarial security testingpenetration testingProof of Concept (PoC)red teamingphysical security penetration testingapplication layer penetration testsnetwork layer penetration testsmanual techniquessource code analysisrisk prioritized finding reportsserver administrationfile management structurePythonPHPPerlRuby.NETvulnerability assessmentsscannerssniffersfuzzersBurpNmapKaliMetasploit
Hard Skills
adversarial security testingpenetration testingProof of Concept (PoC)homegrown exploitationred teamingphysical security penetration testingapplication layer penetration testsnetwork layer penetration testsvulnerability testingmanual techniquessource code analysisrisk prioritized finding reportssecurity vulnerability retestingsecurity countermeasures evaluationblue team consultationsituational awarenessserver administrationfile management structurePythonPHPPerlRuby.NETprogramming experiencevulnerability assessmentsscannerssniffersfuzzersBurpNmapKaliMetasploitInformation Technology (IT) environmentsdefensive countermeasuressecurity assessmentspenetration testing tools and techniquesemerging technologies
Soft Skills
risk prioritized reportingdebriefing system ownersconsulting on remediation optionsstaying current on emerging technologiescollaboration with blue teamsindependent executioncommunication of technical findings
Certifications
Preferred
Offensive Security Certified Professional (OSCP)Global Information Assurance Certification (GIAC)Certified Ethical Hacker (CEH)Certified Information Systems Security Professional (CISSP)
Keywords for Your Resume
Mid-Level Cybersecurity Assessment SpecialistCybersecurity Assessmentadversarial security testingpenetration testingProof of Concept (PoC)red teamingphysical security penetration testingapplication layer penetration testsnetwork layer penetration testsmanual techniquessource code analysisrisk prioritized finding reportsserver administrationfile management structurePythonPHPPerlRuby.NETvulnerability assessmentsscannerssniffersfuzzersBurpNmapKaliMetasploitOffensive Security Certified Professional (OSCP)Global Information Assurance Certification (GIAC)Certified Ethical Hacker (CEH)Certified Information Systems Security Professional (CISSP)
Deal Breakers
3+ years server administration and file management structure experience, 3+ years programming experience in Python, PHP, Perl, Ruby, .NET, or other interpreted or compiled languages, 1+ years penetration testing and vulnerability assessments using manual techniques plus scanners/sniffers/fuzzers and tools such as Burp, Nmap, Kali and Metasploit
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile