Full-Time

Penetration Tester / Threat Emulator

Posted on 8/26/2025

Agile Defense

Agile Defense

1,001-5,000 employees

Cybersecurity and IT services for government

No salary listed

Washington, DC, USA

Hybrid

Hybrid role; some on-site days in the National Capital Region.

US Top Secret Clearance Required

Category
IT & Security (1)
Required Skills
PowerShell
Python
Requirements
  • One or more certifications: GCIA, GCED, GCFE, GCTI, GNFA, GCIH, CND, ECSA, OSCP, OSEE, OSCE, GCFA, GREM, CHFI
  • Offensive Security Certified Professional - OSCP (optional but preferred)
  • Certified Ethical Hacker - CEH (optional)
  • Typically has a bachelor degree, and 4-5 years of experience, or equivalent relevant work experience; e.g., each year of work experience may be substituted for each year of education required.
  • Bachelor’s Degree in Information Technology, Cyber Security, Computer Science, Computer Engineering, Electrical Engineering, or related field of study.
  • Active Top Secret Clearance and SCI Eligibility.
  • Threat Emulation SMEs must have at least 4-5 years of experience in incident detection, cyber defense, cyber intelligence analysis, and/or Penetration Testing.
  • Strong analytical and technical skills in computer network defense operations.
  • Ability to develop rules, filters, views, signatures, countermeasures and operationally relevant applications and scripts to support efforts.
  • Strong proficiency Report writing – a technical writing sample and technical editing test will be required if the candidate has no prior published intelligence analysis reporting, excellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefings.
  • Experience with the identification and implementation of defensive countermeasures or mitigating controls for deployment and implementation in the enterprise network environment.
  • Experience in mentoring and training analysts or Red Team members.
  • Knowledge of incident categories, incident responses, and timelines for responses.
Responsibilities
  • Research and remain up to date with emerging threats and Threat Emulation methodologies.
  • Map Cyber Key Terrain and generate priority target lists.
  • Engage in project meetings to gain knowledge of changes to the infrastructure and information sources that will aid the Threat Emulation Team.
  • Conduct research on commercial and open-source tools that may address capability gaps in detecting and/or blocking malicious activity.
  • Be familiar with development of attack vectors, system and infrastructure reconnaissance, collection of open-source intelligence, enumeration, and footprinting of target networks and services.
  • Conduct in-depth analysis of computer network and host data to determine threat patterns and unusual behaviors to identify potential TTPs employed by adversarial APTs and identify related APT activities and malware within operational networks and systems.
  • Use TTPs to emulate real-world threats in order to train and measure the effectiveness of the people, processes, and technology used to defend environments.
  • Engage with other Agency offices to gain access to various information sources in support of Threat Emulation activities.
  • Review collected monitoring and defense information that will be used as inputs or indicators of abnormalities or malicious activity for threat simulation development.
  • Generate threat intelligence indicators during emulation operations as part of research and apply and fine tune them across the enterprise network.
  • Develop Python or other scripting language for malware creation and/or PowerShell customized scripts, payloads, and system backdoor emulations to simulate attacker behavior within various stages of attack activity, detection evasions, lateral movements, or exfiltration attempts.
  • Utilize the Cyber Threat Framework (ODNI) and production of Threat Emulation findings in said format.
  • Provide reporting for and brief all threat emulation successes at the completion of each approved emulation operation, which may include write-ups and evidence discovered.
  • Provide recommendations on enhancing Threat Emulation capabilities.
Desired Qualifications
  • OSCP

Agile Defense provides IT and cybersecurity services to the U.S. Federal Government, including digital transformation, IT modernization, and a Virtual Security Operations Center (VSOC) to defend against cyber threats. Its services support national security and civilian missions across federal agencies, delivered through various contract vehicles. The company expands its capabilities through acquisitions (IntelliBridge and XOR Security) and focuses on AI-enabled workforce transformation and enterprise IT to enhance government operations. Unlike many suppliers, Agile Defense emphasizes a government-focused portfolio with a multidimensional VSOC and AI-driven workforce upgrades, positioning itself to meet federal security and modernization needs. The goal is to help federal agencies protect data and systems, modernize IT infrastructure, and improve cyber resilience across national security and civilian missions.

Company Size

1,001-5,000

Company Stage

N/A

Total Funding

N/A

Headquarters

Reston, Virginia

Founded

1998

Simplify Jobs

Simplify's Take

What believers are saying

  • IntelliBridge and XOR acquisitions expand AI workforce and enterprise IT capabilities.
  • Agile-Bot II wins DISA JSP prime contract serving 55,000 National Capital Region customers.
  • New executives Bill Luebke CFO and Razwan Raja CINO drive financial and innovation growth.

What critics are saying

  • Peraton undercuts Agile-Bot II on DISA JSP follow-on via pricing, eroding base in 6-12 months.
  • CACI captures Army PEO C3T recompete, stripping PM MC revenue in 12-18 months.
  • CMMC 3.0 exposes VSOC gaps, disqualifying Agile from $10B cyber contracts in 12-18 months.

What makes Agile Defense unique

  • VSOC provides multidimensional cyber threat protection for federal agencies.
  • DuroSuite automates STIG compliance, generating eMASS artifacts in minutes.
  • Agile Labs delivers 5-layer AI stack for DoD agentic AI workflows.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Remote Work Options

Flexible Work Hours

Wellness Program

Mental Health Support

Company News

PR Newswire
Jan 7th, 2025
Agile Defense Scales through IntelliBridge Acquisition

/PRNewswire/ -- Agile Defense, a leading provider of comprehensive digital transformation, data analytics, and cybersecurity solutions for the Department of...

PR Newswire
Mar 27th, 2024
Agile Defense Announces Bill Luebke As Chief Financial Officer

RESTON, Va., March 27, 2024 /PRNewswire/ -- Agile Defense, an end-to-end provider of large-scale, digital transformation, and cybersecurity solutions to national security and federal civilian customers, appointed Bill Luebke as its Chief Financial Officer (CFO). In this role, Luebke will oversee all aspects of financial management and strategy, playing a key role in driving the company's continued success and growth.Prior to joining Agile Defense, Luebke served as the Principal Accounting Officer, Senior Vice President, and Controller at Perspecta (now part of Peraton) where he oversaw the control, analysis, and interpretation of financial records. Luebke previously held senior level positions overseeing financial teams at CSRA Inc. (now GDIT), and CSC."Today marks a pivotal moment in our company's journey as we welcome Bill Luebke as our new Chief Financial Officer. With Bill's proven track record and visionary leadership, we are poised to elevate our financial strategies and drive sustainable growth," said Agile Defense CEO Rick Wagner.Current CFO Daniel Yuly will transition into a new role where he will focus on optimizing the financial performance of Agile Defense's programs and efficient delivery to customers. To learn more about Agile Defense's services and solutions, visit www.Agile-Defense.com.About Agile Defense:Headquartered in Reston, VA, Agile Defense is an end-to-end enterprise IT solutions provider, delivering leading-edge digital transformation and cybersecurity solutions at scale

GovCon Wire
Jan 24th, 2024
Razwan Raja Named Chief Innovation Officer at Agile Defense

Razwan Raja, formerly founder and principal of XOR Security, has been appointed chief innovation officer at information technology services provider Agile Defense, an Enlightenment Capital portfolio company.

PR Newswire
Jan 23rd, 2024
Agile Defense'S Razwan Raja Appointed To Chief Innovation Officer

RESTON, Va., Jan. 23, 2024 /PRNewswire/ -- Agile Defense, an end-to-end provider of large-scale, digital transformation, and cybersecurity solutions to national security and federal civilian customers, is pleased to share that Razwan Raja has been appointed as Chief Innovation Officer (CINO) at Agile Defense. Raja drives the organization's investment in innovation and leads technical teams to develop cutting-edge solutions aligned to customer needs.Previously, Raja served as the Founder and Principal of XOR Security which was acquired by Agile Defense in May 2023. Razwan brings a focus on innovating for customers and a strategic approach to business development efforts. He is adept at creating solutions to complex engineering operations and integration efforts for federal clients within the U.S. and overseas."Elevating Razwan into this role demonstrates how Agile Defense is intentionally focusing on how we can leverage our unique combination of technical talent and innovative capabilities to close mission gaps and retain our nation's competitive advantage," said Agile Defense CEO Rick Wagner

Washington Technology
Dec 13th, 2023
Agile Defense brings in new growth chief

Agile Defense has hired a new chief growth officer in John Hart, a 25-year industry veteran who joins the digital transformation company after working in that same role at Valiant Integrated Services.

INACTIVE