Penetration Tester - Level III (AI) at Core4ce
Remote, Oregon, USA -
Full Time


Start Date

Immediate

Expiry Date

14 Nov, 25

Salary

0.0

Posted On

14 Aug, 25

Experience

7 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Oscp, Operating Systems, Gwapt, Penetration Testing, Macos, Burp Suite, Powershell, Web Applications, Information Technology, Security Tools, Reinforcement Learning, Security Operations, Scripting Languages, Testing, Ruby, Python, Gpen, Network Devices, Lua, Vulnerability

Industry

Information Technology/IT

Description

Information Technology -> Cyber
Remote

ID: 886-383

Full-Time/Regular
As a Penetration Tester – Level III, you will serve as a key technical leader on our cybersecurity team, directly contributing to the protection of networks and sensitive data for a diverse range of customers, including both commercial enterprises and government entities. You will lead security engagements, mentor junior staff, and play a central role in developing innovative capabilities—most notably, AI-driven penetration testing tools that enhance our ability to emulate sophisticated adversaries.
This position offers a dynamic, collaborative environment that values innovation, technical excellence, and professional growth. You will work with a forward-leaning team that embraces cutting-edge technologies and constantly seeks ways to improve security outcomes.

QUALIFICATIONS:

  • Active DoD Top Secret clearance is required.
  • Bachelor’s degree in a related field or 10+ years of experience in cybersecurity or information technology.
  • Active DoD 8570 IAT Level II (or higher) certification.
  • At least one of the following certifications in good standing: OSCP, OSCE, OSWA, OSWE, GPEN, GXPN, GWAPT.
  • Demonstrated experience in both authenticated and unauthenticated testing scenarios.
  • Deep knowledge of modern network protocols, operating systems, web applications, cloud environments, and secure configuration practices.
  • Experience identifying and exploiting vulnerabilities across various platforms (e.g., Windows, Linux, macOS, network devices, web APIs).
  • Proficient with open-source and commercial security tools (e.g., Nmap, Kali Linux, Cobalt Strike, Burp Suite, etc.).
  • Proficiency with scripting languages such as Python, Ruby, Lua, NSE, or PowerShell.
  • Experience developing or integrating AI/ML solutions into cybersecurity workflows is highly desirable.

PREFERRED EXPERIENCE:

  • 7+ years of hands-on experience in penetration testing and vulnerability assessments.
  • 7+ years supporting security operations or threat hunting activities.
  • Experience developing automated tools and frameworks for testing and exploitation.
  • Familiarity with MITRE ATT&CK, D3FEND, and adversary emulation techniques.
  • Prior experience in red and purple team exercises.
  • Comfort developing Rules of Engagement, TTPs, and other operational documentation.
  • Exposure to AI model training, reinforcement learning, or adversarial machine learning concepts is a plus.

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities

Operating with minimal supervision in support of the Department of Defense (DoD), your responsibilities include:

  • Lead Penetration Testing Engagements – Serve as the technical lead during internal and external security assessments, simulating real-world attack techniques to identify vulnerabilities and evaluate defenses.
  • Vulnerability Analysis and Exploitation – Perform in-depth analysis and exploitation of vulnerabilities across applications, operating systems, and networks, including the development of custom exploits.
  • Threat Emulation and Scenario Design – Create and execute complex test scenarios, including red and purple team exercises, tailored to customer environments.
  • Reporting and Executive Briefings – Produce comprehensive technical reports and executive-level presentations that clearly communicate risks, findings, and actionable mitigation strategies.
  • Advanced Analysis – Conduct reverse engineering, static/dynamic malware analysis, and offline code analysis to uncover hidden threats and support incident response efforts.
  • Collaboration – Work closely with IR/SOC teams as needed during investigations, and contribute to the development of internal TTPs, policies, and CONOPs.
  • Client Interaction – Interface with clients, present findings, and advise stakeholders on strategic and tactical security improvements.
  • Travel – May require occasional travel to client sites.
  • AI-Based Tool Development – Design, develop, and integrate AI-powered penetration testing scripts and tools to automate reconnaissance, vulnerability identification, and exploitation workflows. Collaborate with data scientists and engineers to build intelligent systems that replicate advanced adversary tactics.
Loading...