Need a Penetration Security Engineer to do the following:
Conduct penetration testing on approximately 60,000 devices and 24,000 users.
The goals of the engagement are (1) to simulate an attack to identify and enumerate security weaknesses; (2) assess the extent to which an attacker may be able to penetrate the environment both from internal and external sources; and (3) demonstrate the extent of compromise to the environment based on the following “success” criteria:
Ability to obtain sensitive data from county databases (anonymize data in documentation/reports).
• Compromise of an intermediary device used by privileged users to access the database, web, or systems.
• Ability to obtain or compromise domain, web servers, and/or Data Base Administrator with privileged user credentials.
• Access elevated privilege compromise of the systems and servers.