Monday, February 15, 2016

Need-Penetration Tester-VA

Hi,

 

Hope you are doing well!

Please find the position below and let me know your availability with the updated copy of resume.

 

Penetration Tester

Richmond, VA

1 Year Contract

 

Purpose

The Virginia Retirement System (VRS) is seeking sealed proposals from qualified firms to provide Penetration Testing Services. It is the intent of VRS to make multiple awards. The initial contract period shall be one year with five (5) one year renewal options.

 

Statement of Need

VRS defines a penetration test as a concerted attempt by knowledgeable certified professionals, using real-world attacks, to bypass or circumvent security controls, or to exploit weaknesses in the various systems to gain unauthorized or administrative access to VRS systems or networks. Vulnerability scanning (using automated tools to identify and classify vulnerabilities using a repository of scripts and/or vulnerabilities) may be considered a part of a penetration test, but such automated processes alone are not considered to be a true penetration test. Any vulnerability identified through any means should be fully tested to determine the actual risk and ramifications of those vulnerabilities.

 

Requirements:

1. The following categories of penetration testing services are desired:

a. External Web Application Penetration testing

b. External Network Penetration Testing

c. Internal Web Application Penetration Testing

d. Internal Network Penetration Testing

e. Wireless Network Penetration Testing

f. Social Engineering

g. Source Code Review

h. Security Assessments for the following:

i. Firewall and Routers

ii. Database Architecture

iii. Active Directory

iv. Telecommunication's

 

2. The following requirements apply to each test:

a. The selected Contractor shall attempt to:

i. escalate privileges beyond those of a normal external user

ii. gain access to restricted information

iii. gain administrative control of systems

iv. bypass security controls on the various systems and applications

b. Any tools, scripts, or methods which show a reasonable likelihood of causing disruption of VRS networks or systems are to be fully discussed with VRS Point of Contact along with appropriate remediation/recovery strategies prior to execution against VRS networks or systems. VRS may require that such processes be run within a specific time-window outside normal business hours.

c. The Contractor will take all reasonable precautions to ensure that any information gathered or generated during the test will be accessible only to those individuals involved in performing the test and/or generating the report. The Contractor is expected to run hard disk encryption on any portable laptop used to gather data.

d. Secure communications should be used for all status updates, reports or information gathering.

e. During each test the Contractor will appoint a technical point of contact (POC), directly involved in the test, who will be available by phone 24/7 during the test.

f. Up to two retests of any High or Critical findings should be provided at no extra cost (this work would be remote)

g. It is expected that manual penetration assessment techniques be used in tests in conjunction with any desired automated tools/techniques.

h. Contractor is to make every effort to identify and remove false positives from the test report and remove anything that is not a true material threat or vulnerability. The Contractor should not list vulnerabilities that cannot be substantiated or that are just theoretical. Theoretical vulnerabilities are expected to be tested and removed if not susceptible to attack. It should be clearly noted and explained why if these vulnerabilities remain on the report; mitigating factors should be noted with an accurate level of risk. Reviewing VRS hardening documentation, exception requests or interviewing technical staff may be necessary to apply an appropriate risk factor on theoretical vulnerabilities.

 

3. VRS requires the following deliverables for each project:

a. The deliverable for each project will be a comprehensive test report. This test report is expected to be customized for each specific test, and to include understandable, well-reasoned and insightful descriptions of the various findings, mitigations, and recommendations. It's expected the report will be written by the team conducting the test (and reviewed by tech writers as necessary). Canned reports generated by automated tools (e.g. detailed scanner results) are expected to be included as a separate technical report. All highly sensitive information such as passwords, encryption keys, financial or personally identifiable information is to be obscured or removed from report. The following define the requirements for each test report. The report(s) should, at a minimum, contain the following sections:

 

1) Executive Summary containing an overview of the test and test results, and highlighting significant findings, including things VRS is performing well and things we need to improve, appropriate for upper management. This section of the report must be useful and understandable to non-technical personnel.

2) Technical Report appropriate for technical personnel, containing:

a). Inventory of systems assessed

• Hostname / IP address

• System function (web server, email server, etc.)

• Risk level for the particular system as determined and confirmed by the penetration test results.

b) Detailed vulnerability description

• Description of the vulnerability

• Description of mitigating factors in place

• Level of risk as it applies to the specific case

• System(s) affected

• Ramification of exploitation

• Remediation recommendations

c) Detailed timeline of the test identifying each step of the test. Included for each step:

• Date/time stamp

• Vulnerability / issue explored

• System(s) affected

• Method(s) employed

• Tool(s) employed

• Expected results

• Actual results

• Screen shots where appropriate

d) Evidence of system access

• Screen shots of non-public information, or showing administrative access (redact any sensitive or confidential information)

• Plain-text flag files using readily identifiable names and contents.

• Other non-destructive, non-disruptive method.

 

The Contractor is to make every effort to identify and remove false positives from the report and remove anything that is not a true material threat or vulnerability. The Contractor should not list vulnerabilities that cannot be substantiated or that are just theoretical. Theoretical vulnerabilities are expected to be tested and removed if not susceptible to attack. It should be clearly noted and explained why if these vulnerabilities remain on the report; mitigating factors should be noted with an accurate level of risk. Reviewing VRS hardening documentation, exception requests or interviewing technical staff

 

Staff Required Under this Contract:

1) VRS requires that the staff assigned to a project be a Certified Professional that is holding a current certification in one or more of the following or equivalent.

• CISSP (Certified Information Systems Security Professional)

• OSCP (Offensive Security Certified Professional)

• CHFI (Certified Hacking Forensic Investigator)

• CEH (Certified Ethical Hacker

• GIAC-GPEN (Penetration Testers)

• GIAC-GWAPT (Application Penetration Tester).

 

Thanks

 

Amanpreet Singh

Direct: 408 216 8035 Fax: 703-722-6628

Email: asingh@elegantsolutions.us

Elegant Enterprise-Wide Solutions, Inc

We Participate in E-Verify

An SBA 8(a), ISO 9001:2008 Company

Prime on GSA Schedule 70, 8(a) STARS II, eFAST, Seaport-e & many State/Local Contracts http://www.elegantsolutions.us


--
You received this message because you are subscribed to the Google Groups "US Jobs: Requirements, Clients and Consultants" group.
To unsubscribe from this group and stop receiving emails from it, send an email to recruiters-r-us+unsubscribe@googlegroups.com.
To post to this group, send email to recruiters-r-us@googlegroups.com.
Visit this group at https://groups.google.com/group/recruiters-r-us.
For more options, visit https://groups.google.com/d/optout.

No comments:

Post a Comment

AddThis Smart Layers

Attention

The job offers on this web site are not related with jobs724.blogspot.com and the owner of the website. These job offers indexed by RSS feed from Google Groups about Online Job offers, Software Jobs, IT Jobs, Recruiters&Consultants, USA Jobs etc. This site does not reserve any rights to, nor claims copyright to, any software names listed on these pages. All references are copyright to their respective owners. If you want to apply for any job, you need to contact with the owner of job, not with any admins of jobs724.blogspot.com. If you have any doubts about legality of content or you have another suspicions, feel free to contact us.

Find the latest software jobs, Talent from US and Canada. ASP.NET, VB.NET, C#, ADO.NET, Consultamcy, ASP.NET, VB.NET, C#, ADO.NET, Consultamcy SAP, client-server, e-commerce and web development etc., SAP APO Green Card H1B, B1, JAVA J2EE, RMI, XML, weblogic, websphere JDBC

Stay Updated!

We have indexed IT job opportunities and counting! Don't miss any chance. Subscribe us and get the latest IT jobs listings to your inbox!

Jobs Archive