
Senior Security Test & Evaluation Analyst
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Senior Security Test & Evaluation Analyst with a contract length of "unknown" at a pay rate of $50 - $60 per hour. Key skills include CISSP, OSCP, GPEN, and extensive experience in ethical hacking, vulnerability analysis, and security testing.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
480
-
ποΈ - Date discovered
September 2, 2025
π - Project duration
Unknown
-
ποΈ - Location type
Unknown
-
π - Contract type
Unknown
-
π - Security clearance
Unknown
-
π - Location detailed
Washington, DC
-
π§ - Skills detailed
#Scripting #Linux #Firewalls #Security #Database Security #Network Security #SQL (Structured Query Language) #Cloud
Role description
COMPENSATION: $50 - $60 per hour
CERTIFICATIONS: CISSP, Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN) or Equivalent
Responsibilities
1. Implement comprehensive security testing to include all phases of the ethical hacking process (e.g., reconnaissance, footprinting, scanning, exploitation, and post-exploitation).
1. Conduct security assessment activities (e.g., static or dynamic code review, system architecture diagram review, control evaluation).
1. Analyze data, identify vulnerabilities, and develop corresponding mitigation strategies.
1. Conduct scenario-based and functional security testing during authenticated and unauthenticated testing
Qualifications
β’ At least five years of experience performing the functions associated with this labor category.
β’ Experience implementing comprehensive security tests that include all phases of the ethical hacking process (e.g., reconnaissance, footprinting, scanning, exploitation, and postexploitation) and other security assessment activities (e.g., static or dynamic code review, system architecture diagram review, control evaluation) to demonstrate or emulate an adversaryβs ability to gain unauthorized access to sensitive data and systems that reside in either local (on-premises) or cloud computing solutions.
β’ Experience analyzing data, identifying vulnerabilities, and developing corresponding mitigation strategies.
β’ Experience conducting scenario-based and functional security testing during authenticated and unauthenticated testing.
β’ Deep understanding of network protocols, configurations, security technologies, and security practices, including network security, operating system hardening, database security, and web application security for both local (on-premises) and cloud computing solutions.
β’ Deep understanding of common vulnerabilities and attack vectors, including experience identifying and exploiting vulnerabilities in operating systems (e.g., Windows, Linux, and macOS), network devices (e.g., firewalls, routers, and switches) and web applications and application program interfaces (e.g., SQL injection, cross-site scripting and cross-site request forgery).
COMPENSATION: $50 - $60 per hour
CERTIFICATIONS: CISSP, Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN) or Equivalent
Responsibilities
1. Implement comprehensive security testing to include all phases of the ethical hacking process (e.g., reconnaissance, footprinting, scanning, exploitation, and post-exploitation).
1. Conduct security assessment activities (e.g., static or dynamic code review, system architecture diagram review, control evaluation).
1. Analyze data, identify vulnerabilities, and develop corresponding mitigation strategies.
1. Conduct scenario-based and functional security testing during authenticated and unauthenticated testing
Qualifications
β’ At least five years of experience performing the functions associated with this labor category.
β’ Experience implementing comprehensive security tests that include all phases of the ethical hacking process (e.g., reconnaissance, footprinting, scanning, exploitation, and postexploitation) and other security assessment activities (e.g., static or dynamic code review, system architecture diagram review, control evaluation) to demonstrate or emulate an adversaryβs ability to gain unauthorized access to sensitive data and systems that reside in either local (on-premises) or cloud computing solutions.
β’ Experience analyzing data, identifying vulnerabilities, and developing corresponding mitigation strategies.
β’ Experience conducting scenario-based and functional security testing during authenticated and unauthenticated testing.
β’ Deep understanding of network protocols, configurations, security technologies, and security practices, including network security, operating system hardening, database security, and web application security for both local (on-premises) and cloud computing solutions.
β’ Deep understanding of common vulnerabilities and attack vectors, including experience identifying and exploiting vulnerabilities in operating systems (e.g., Windows, Linux, and macOS), network devices (e.g., firewalls, routers, and switches) and web applications and application program interfaces (e.g., SQL injection, cross-site scripting and cross-site request forgery).