State of Maryland

DoIT Penetration Tester II (#004744)

- Hourly / - BiWeekly /
- Monthly / $95,798.00-$160,555.00 Yearly


GRADE

STD 0024

CLASS ATTRIBUTES

SKILLED SERVICE   BARGAINING UNIT: G    NCP 

NATURE OF WORK

A Department of Information Technology (DoIT) Penetration Tester II is the full performance level of work in the Office of Security Management (OSM) identifying mechanisms by which adversaries could gather information about the State’s resources, penetrate the State’s infrastructure and cause harm to the State. Employees in this classification do not supervise.

Employees in this classification receive general supervision from the DoIT Special Projects Lead or other higher level IT manager or director.

Positions in this classification are evaluated using the Classification Job Evaluation Methodology. The use of this method involves comparing the assigned duties and responsibilities of a position to the job criteria found in the Nature of Work and Examples of Work sections of a class specification.

The DoIT Penetration Tester I and DoIT Penetration Tester II are differentiated on the basis of supervisory control by the supervisor over these employees. The DoIT Penetration Tester I performs duties under close supervision at times and under general supervision at other times depending on the complexity of the specific duty being performed, and the DoIT Penetration Tester II performs the full range of duties under general supervision. The DoIT Penetration Tester II is differentiated from the DoIT Penetration Tester, Lead/Advanced in that the DoIT Penetration Tester, Lead/Advanced assigns, reviews and approves the work of and trains lower-level DoIT Penetration Testers or serves as a project lead or addresses the most complex tasks and escalated issues prior to engaging a higher-level IT manager or director.

EXAMPLES OF WORK

Conducts and/or supports authorized penetration testing on enterprise network assets;

Performs penetration testing as required for new or updated applications;

Applies and utilizes authorized cyber capabilities to enable access to targeted networks;

Applies cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements;

Applies and obeys applicable statutes, laws, regulations and policies;

Performs analysis for target infrastructure exploitation activities;

Collaborates with other internal and external partner organizations on target access and operational issues;

Communicates new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers;

Conducts analysis of physical and logical digital technologies (e.g., wireless, Supervisory Control and Data Acquisition (SCADA), telecom) to identify potential avenues of access;

Creates comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities;

Examines intercept-related metadata and content with an understanding of targeting significance;

Collaborates with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development;

Identifies gaps in our understanding of target technology and developing innovative collection approaches;

Identifies, locates, and tracks targets via geospatial analysis techniques;

Leads or enables exploitation operations in support of organization objectives and target requirements;

Maintains awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications;

Monitors target networks to provide indications and warning of target communications changes or processing failures;

Produces network reconstructions;

Profiles network or system administrators and their activities;

Performs other related duties.

KNOWLEDGE, SKILLS AND ABILITIES

Knowledge of computer networking concepts and protocols, and network security methodologies; Knowledge of risk management processes (e.g., methods for assessing and mitigating risk); Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy; Knowledge of cybersecurity and privacy principles; Knowledge of cyber threats and vulnerabilities; Knowledge of specific operational impacts of cybersecurity lapses; Knowledge of application vulnerabilities; Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless); Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies; Knowledge of collection management processes, capabilities, and limitations; Knowledge of front-end collection systems, including traffic collection, filtering, and selection; Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks); Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems; Knowledge of website types, administration, functions, and content management system (CMS); Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation; Knowledge of relevant reporting and dissemination procedures; Knowledge of attack methods and techniques (Distributed Denial of Service (DDoS), brute force, spoofing, etc.); Knowledge of implants that enable cyber collection and/or preparation activities; Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis); Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.; Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, Voice Over Internet Protocol (VOIP), Media Over Internet Protocol (IP), Virtual Private Network (VPN), ery small aperture terminal (VSAT)/wireless, web mail and cookies; Knowledge of common networking devices and their configurations; Knowledge of common reporting databases and tools; Knowledge of concepts for operating systems (e.g., Linux, Unix.); Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media); Knowledge of data flow process for terminal or environment collection; Knowledge of evasion strategies and techniques; Knowledge of how hubs, switches, routers work together in the design of a network; Knowledge of how Internet applications work (Simple Mail Transfer Protocol (SMTP) email, web-based email, chat clients, VOIP); Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, Hypertext Transfer Protocol (http); Knowledge of identification and reporting processes; Knowledge of Internet and routing protocols; Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, Transmission Control Protocol (TCP)/ User Datagram Protocol (UDP) port numbering); Knowledge of intrusion sets; Knowledge of midpoint collection (process, objectives, organization, targets, etc.); Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection); Knowledge of network topology; Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives; Knowledge of organizational and partner policies, tools, capabilities, and procedures; Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities; Knowledge of scripting; Knowledge of strategies and tools for target research; Knowledge of target intelligence gathering and operational preparation techniques and life cycles; Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.); Knowledge of the basic structure, architecture, and design of converged applications; Knowledge of the basic structure, architecture, and design of modern communication networks; Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Skill in identifying gaps in technical capabilities; Skill in analyzing traffic to identify network devices; Skill in creating and extracting important information from packet captures; Skill in creating collection requirements in support of data acquisition activities; Skill in creating plans in support of remote operations; Skill in depicting source or collateral data on a network map; Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both Large Area Network (LAN) and Wide Area Network (WAN) environments; Skill in evaluating accesses for intelligence value. Skill in generating operation plans in support of mission and target requirements; Skill in identifying the devices that work at each level of protocol models; Skill in identifying, locating, and tracking targets via geospatial analysis techniques; Skill in interpreting compiled and interpretive programming languages; Skill in interpreting metadata and content as applied by collection systems; Skill in navigating network visualization software; Skill in performing data fusion from existing intelligence for enabling new and continued collection; Skill in recognizing and interpreting malicious network activity in traffic; Skill in recognizing midpoint opportunities and essential information; Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information); Skill in researching vulnerabilities and exploits utilized in traffic; Skill in target development in direct support of collection operations; Skill in using databases to identify target-relevant information; Skill in using non-attributable networks; Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction; Skill in writing (and submitting) requirements to meet gaps in technical capabilities.

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means; Ability to accurately and completely source all data used in intelligence, assessment and/or planning products; Ability to collaborate effectively with others; Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists; Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products; Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products; Ability to expand network access by conducting target analysis and collection to identify targets of interest; Ability to identify/describe target vulnerability; Ability to identify/describe techniques/methods for conducting technical exploitation of the target; Ability to select the appropriate implant to achieve operational goals.

MINIMUM QUALIFICATIONS

Experience: Twelve years of experience in an IT position with primary responsibility that includes network management, server management, or security operations.  At least two years of specialized experience performing penetration tests and/or red-team exercises. 

Notes:

1. Candidates may substitute a bachelor’s degree in computer science, IT security or other related field for up to four years of the required experience.

2. Candidates may substitute the “Education” requirement listed above, for a High School Diploma or possession of a High School Equivalency certificate and two additional years of experience as described above.

3. Candidates may substitute up to two years of the “Experience” requirement listed above for a graduate level degree in Computer science, IT security or other related field.

LICENSES, REGISTRATIONS AND CERTIFICATIONS

Must have a Penetration Tester Level II or higher certification as described on the Maryland Department of Information Technology website.

SPECIAL REQUIREMENTS

Employees in this classification may be subject to call-in 24 hours a day and, therefore, may be required to provide the employing agency with a telephone number where the employee can be reached. Employees may be furnished with a pager or cell phone.

Applicants for this classification may handle sensitive data. This will require a full scope background investigation prior to appointment. A criminal conviction may be grounds for rejection of the applicant.

Employees may occasionally be required to travel to field locations and must have access to an automobile in the event a state vehicle cannot be provided. Standard mileage allowance will be paid for use of a privately owned vehicle.

ACKNOWLEDGEMENTS

Class Descriptions are broad descriptions covering groups of positions used by various State departments and agencies.  Position descriptions maintained by the using department or agency specifically address the essential job functions of each position. 

This is a Skilled Service classification in the State Personnel Management System. All positions in this classification are Skilled Service positions. Some positions in Skilled Service classifications may be designated Special Appointment in accordance with the State Personnel and Pensions Article, Section 6-405, Annotated Code of Maryland.

This classification is assigned to Bargaining Unit G, Engineering, Scientific and Administrative Professionals classes. As provided by the State Personnel and Pensions Article, Section 3-102, special appointment, temporary, contractual, supervisory, managerial and confidential employees are excluded from collective bargaining. Additionally, certain executive branch agencies are exempt from collective bargaining and all positions in those agencies are excluded from collective bargaining.

 

This classification is one level in a Non-Competitive Promotion (NCP) series.  NCP promotions are promotions by which employees may advance in grade and class level from trainee to full performance level in a classification series.  In order to be non-competitively promoted to the next level in a NCP series, an employee must: 1) perform the main purpose of the class, as defined by the Nature of Work section of the class specification; 2) receive the type of supervision defined in the class specification and 3) meet the minimum qualifications of the classification.

Date Established

July 1, 2021

Approved By

Director, Division of Classification and Salary


CLASS: 004744; EST: 7/1/2021; REV: 1/3/2022;

Powered by JobAps