ICE Consulting

ICE Consulting

ICE Consulting specializes in providing comprehensive IT management, consulting, and cybersecurity services tailored for small and medium-sized businesses, allowing them to efficiently manage their IT needs while focusing on their core operations.

Internet Software & Services
51-250
Founded 1996

Description

  • Perform Active Directory penetration testing to identify privilege escalation paths, insecure configurations, and lateral movement opportunities.
  • Conduct internal and external network penetration tests to uncover vulnerabilities and weaknesses in enterprise infrastructure.
  • Perform web application penetration testing, including authentication, input validation, session management, and business logic testing.
  • Identify and analyze security misconfigurations across systems, services, and network infrastructure.
  • Conduct security audits and configuration reviews against security best practices and industry standards.
  • Evaluate vulnerabilities and misconfigurations to assess business impact and overall risk.
  • Document findings with clear risk ratings, remediation guidance, and mitigation recommendations.
  • Participate in purple-team engagements by simulating attacker techniques and improving SOC detection and response capabilities.
  • Support threat simulation exercises using real-world attack techniques and frameworks such as MITRE ATT&CK.
  • Work with SOC and defensive teams to improve alerting, monitoring, and threat detection use cases.
  • Validate remediation efforts through retesting and verification of fixes.
  • Prepare technical and executive-level reports summarizing findings, risks, and recommendations.

Requirements

  • Hands-on experience in Active Directory security assessments and penetration testing.
  • Strong knowledge of network penetration testing methodologies.
  • Experience in web application security testing, including OWASP Top 10 areas.
  • Understanding of security configuration reviews and misconfiguration analysis.
  • Experience performing vulnerability validation and risk analysis.
  • Hands-on experience with tools such as Nmap, Burp Suite, Metasploit, BloodHound, Impacket, and CrackMapExec.
  • Strong understanding of Windows security architecture and Active Directory attack techniques.
  • Knowledge of network protocols, authentication mechanisms, and common attack vectors.
  • Experience with purple-team exercises is preferred.
  • Exposure to SOC operations, SIEM platforms, or security monitoring is a plus.
  • Familiarity with the MITRE ATT&CK framework is preferred.
  • Scripting knowledge in Python, PowerShell, or Bash is preferred.
  • Exposure to cloud security assessments in Azure or AWS is preferred.
  • Preferred certifications include PNPT, eCPPT, GPEN, or GWAPT.
  • Strong analytical and problem-solving mindset.
  • Ability to clearly communicate technical risks and remediation steps.
  • Good documentation and reporting skills.
  • Ability to collaborate with both offensive and defensive security teams.
  • Curiosity and passion for continuous learning in cybersecurity.

Interested in this position?

Apply directly on the company website

Apply Now

Similar Roles

Instructor - Certified Cloud Security Professional (CCSP)

Fullstack Academy 11-50 Diversified Consumer Services

Simplilearn is hiring a part-time online instructor to teach CCSP certification cohorts, support adult learners in live virtual classes, and help students apply cloud security concepts to real-world practice.

AWS Azure Cybersecurity DevSecOps Encryption
5 hours, 26 minutes ago

Information Security Specialist

Vero HR 11-50 Professional Services

A fast-growing cyber security consultancy is hiring an Information Security Specialist to support a diverse portfolio of clients by assessing security posture, shaping improvement plans, and delivering client implementation projects.

Cybersecurity HIPAA Penetration Testing
5 hours, 26 minutes ago

ServiceNow IRM Consultant

Pierce 11-50 Professional Services

Pierce Technology Corp is hiring a ServiceNow IRM Consultant to implement and optimize Integrated Risk Management solutions that support risk management and regulatory compliance for client organizations.

JavaScript
5 hours, 41 minutes ago

Sr. Solutions Architect II (6543)

MetroStar 251-1K IT Services

MetroStar is hiring a Sr. Solutions Architect II (Zero Trust and RMF) to design and govern security architectures for the IC environment that support risk-based authorization, continuous monitoring, and secure information sharing.

SIEM SOC
13 hours, 26 minutes ago

You're on a roll! Sign up now to keep applying.

Sign Up

Already have an account? Log in

Used by 14,729+ remote workers