Job Description


phia LLC is seeking highly skilled full time W2 and 1099 Red Teamers/Penetration Testers to join our team of qualified, diverse individuals in support of the Department of Homeland Security's (DHS) National Cybersecurity Assessments and Technical Services (NCATS) program providing vulnerability assessments, development of assessment methodologies, and technical program advisement.

Basically, come join a team and a unique opportunity to conduct assessments across the federal government, state and local governments, as well as, critical infrastructure and private companies. The assessment length can vary, based on the number and type of services requested, but a typical assessment will take place over a two-week period. The first week being conducted in a lab based in Northern Virginia, and the second week at the customer's location, internal to their network.


  • Conduct vulnerability/pentesting assessments using approved tools and following an approved methodology, scope, and rules of engagement.
  • Identify security vulnerabilities that could allow an attacker to compromise client information or systems.
  • Performs assessments of systems and networks within the enterprise and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.
  • Measures effectiveness of defense-in-depth architecture against known vulnerabilities and attack techniques.
  • Conduct and/or support authorized penetration testing on enterprise network assets with a focus on application security.
  • Define procedures for penetration testing assessment for servers, endpoints, network appliances, and applications.
  • Perform application security assessments of key business services and provide written reports on the security posture of those systems.
  • Collaborate with DHS and assessed organizations to identify and defend against common attack vectors.
  • Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
  • Advise government and assessed organization’s leadership on Plans of Action and Milestones (POA&Ms) for vulnerability remediation.



  • 1-4 years of experience
  • Diverse experience in cyber security vulnerability assessments with a focus on application security assessments, or equivalent combination of education and work experience
  • Ethical hacking experience including experience in Information Security, application vulnerability testing, code-level security auditing, and secure code reviews
  • Demonstrating leadership ability
  • Working knowledge of various operating systems, tools, and scripting languages such as *NIX, Windows, Kali Linux, Cobalt Strike, Metasploit, Nmap, Nessus, EyeWitness, WireShark, Powershell, Python, etc.
  • Bachelor’s Degree in a technical specialty such as cyber security, computer science, management information systems or related IT field [relevant work and educational experience may be substituted for degree]
  • Certifications: (One or more required) OSCE, OSCP, GPEN or equivalent Red Team certs
  • CISSP and CEH are a bonus, but not required


  • Working knowledge of Colbalt Strike, Immunity Canvas, Core Impact and similar GOTS/COTS platforms
  • Ability to develop or modify exploits based on vulnerability reports
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Knowledge of laws, regulations, policies, and ethics as they relate to penetration testing.
  • Knowledge of ethical hacking principles and techniques.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application
Save Job