Hi,
Hope you are doing well!
Please find the position below and let me know your availability with the updated copy of resume.
Penetration Tester
Richmond, VA
1 Year Contract
Purpose
The Virginia Retirement System (VRS) is seeking sealed proposals from qualified firms to provide Penetration Testing Services. It is the intent of VRS to make multiple awards. The initial contract period shall be one year with five (5) one year renewal options.
Statement of Need
VRS defines a penetration test as a concerted attempt by knowledgeable certified professionals, using real-world attacks, to bypass or circumvent security controls, or to exploit weaknesses in the various systems to gain unauthorized or administrative access to VRS systems or networks. Vulnerability scanning (using automated tools to identify and classify vulnerabilities using a repository of scripts and/or vulnerabilities) may be considered a part of a penetration test, but such automated processes alone are not considered to be a true penetration test. Any vulnerability identified through any means should be fully tested to determine the actual risk and ramifications of those vulnerabilities.
Requirements:
1. The following categories of penetration testing services are desired:
a. External Web Application Penetration testing
b. External Network Penetration Testing
c. Internal Web Application Penetration Testing
d. Internal Network Penetration Testing
e. Wireless Network Penetration Testing
f. Social Engineering
g. Source Code Review
h. Security Assessments for the following:
i. Firewall and Routers
ii. Database Architecture
iii. Active Directory
iv. Telecommunication's
2. The following requirements apply to each test:
a. The selected Contractor shall attempt to:
i. escalate privileges beyond those of a normal external user
ii. gain access to restricted information
iii. gain administrative control of systems
iv. bypass security controls on the various systems and applications
b. Any tools, scripts, or methods which show a reasonable likelihood of causing disruption of VRS networks or systems are to be fully discussed with VRS Point of Contact along with appropriate remediation/recovery strategies prior to execution against VRS networks or systems. VRS may require that such processes be run within a specific time-window outside normal business hours.
c. The Contractor will take all reasonable precautions to ensure that any information gathered or generated during the test will be accessible only to those individuals involved in performing the test and/or generating the report. The Contractor is expected to run hard disk encryption on any portable laptop used to gather data.
d. Secure communications should be used for all status updates, reports or information gathering.
e. During each test the Contractor will appoint a technical point of contact (POC), directly involved in the test, who will be available by phone 24/7 during the test.
f. Up to two retests of any High or Critical findings should be provided at no extra cost (this work would be remote)
g. It is expected that manual penetration assessment techniques be used in tests in conjunction with any desired automated tools/techniques.
h. Contractor is to make every effort to identify and remove false positives from the test report and remove anything that is not a true material threat or vulnerability. The Contractor should not list vulnerabilities that cannot be substantiated or that are just theoretical. Theoretical vulnerabilities are expected to be tested and removed if not susceptible to attack. It should be clearly noted and explained why if these vulnerabilities remain on the report; mitigating factors should be noted with an accurate level of risk. Reviewing VRS hardening documentation, exception requests or interviewing technical staff may be necessary to apply an appropriate risk factor on theoretical vulnerabilities.
3. VRS requires the following deliverables for each project:
a. The deliverable for each project will be a comprehensive test report. This test report is expected to be customized for each specific test, and to include understandable, well-reasoned and insightful descriptions of the various findings, mitigations, and recommendations. It's expected the report will be written by the team conducting the test (and reviewed by tech writers as necessary). Canned reports generated by automated tools (e.g. detailed scanner results) are expected to be included as a separate technical report. All highly sensitive information such as passwords, encryption keys, financial or personally identifiable information is to be obscured or removed from report. The following define the requirements for each test report. The report(s) should, at a minimum, contain the following sections:
1) Executive Summary containing an overview of the test and test results, and highlighting significant findings, including things VRS is performing well and things we need to improve, appropriate for upper management. This section of the report must be useful and understandable to non-technical personnel.
2) Technical Report appropriate for technical personnel, containing:
a). Inventory of systems assessed
• Hostname / IP address
• System function (web server, email server, etc.)
• Risk level for the particular system as determined and confirmed by the penetration test results.
b) Detailed vulnerability description
• Description of the vulnerability
• Description of mitigating factors in place
• Level of risk as it applies to the specific case
• System(s) affected
• Ramification of exploitation
• Remediation recommendations
c) Detailed timeline of the test identifying each step of the test. Included for each step:
• Date/time stamp
• Vulnerability / issue explored
• System(s) affected
• Method(s) employed
• Tool(s) employed
• Expected results
• Actual results
• Screen shots where appropriate
d) Evidence of system access
• Screen shots of non-public information, or showing administrative access (redact any sensitive or confidential information)
• Plain-text flag files using readily identifiable names and contents.
• Other non-destructive, non-disruptive method.
The Contractor is to make every effort to identify and remove false positives from the report and remove anything that is not a true material threat or vulnerability. The Contractor should not list vulnerabilities that cannot be substantiated or that are just theoretical. Theoretical vulnerabilities are expected to be tested and removed if not susceptible to attack. It should be clearly noted and explained why if these vulnerabilities remain on the report; mitigating factors should be noted with an accurate level of risk. Reviewing VRS hardening documentation, exception requests or interviewing technical staff
Staff Required Under this Contract:
1) VRS requires that the staff assigned to a project be a Certified Professional that is holding a current certification in one or more of the following or equivalent.
• CISSP (Certified Information Systems Security Professional)
• OSCP (Offensive Security Certified Professional)
• CHFI (Certified Hacking Forensic Investigator)
• CEH (Certified Ethical Hacker
• GIAC-GPEN (Penetration Testers)
• GIAC-GWAPT (Application Penetration Tester).
Thanks
Amanpreet Singh
Direct: 408 216 8035 Fax: 703-722-6628
Email: asingh@elegantsolutions.us
Elegant Enterprise-Wide Solutions, Inc
We Participate in E-Verify
An SBA 8(a), ISO 9001:2008 Company
Prime on GSA Schedule 70, 8(a) STARS II, eFAST, Seaport-e & many State/Local Contracts http://www.elegantsolutions.us
You received this message because you are subscribed to the Google Groups "US Jobs: Requirements, Clients and Consultants" group.
To unsubscribe from this group and stop receiving emails from it, send an email to recruiters-r-us+unsubscribe@googlegroups.com.
To post to this group, send email to recruiters-r-us@googlegroups.com.
Visit this group at https://groups.google.com/group/recruiters-r-us.
For more options, visit https://groups.google.com/d/optout.
No comments:
Post a Comment