3322 Penetration Tester

Contact One Communications, Inc.
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate

Job location

Remote

Tech stack

Microsoft Windows
Software System Penetration Testing
User Authentication
Bash
Unix
Computer Security
Python
Korn Shell
Network Security
Network administration
Powershell
Software Engineering
Web Applications
Scripting (Bash/Python/Go/Ruby)
Software Security
Information Technology
Cybercrime
Tools for Reporting
Cyber Warfare
Vulnerability Analysis
Go

Job description

NCIA has been established with a view to meeting to the best advantage the collective requirements of some or all NATO nations in the fields of capability delivery and service provision related to Consultation, Command & Control as well as Communications, Information and Cyber Defense functions, thereby also facilitating the integration of Intelligence, Surveillance, Reconnaissance, Target Acquisition functions and their associated information exchange.

The NCIA NATO Cyber Security Centre (NCSC) is responsible for planning and executing all lifecycle management activities for cyber security. In executing this responsibility, NCSC provides specialist cyber security-related services covering the spectrum of scientific, technical, acquisition, operations, maintenance, and sustainment support, throughout the lifecycle of NATO Information Communications and Technology (ICT).

Within the NCSC, the Assess Branch performs comprehensive vulnerability assessments, penetration testing, security compliance audits and red teaming activities against NATO CIS components throughout their lifecycle and across the NATO CIS footprint, improving its cyber hygiene while contributing to the CIS accreditation, IT change management and cyber incident response and recovery processes. It reports on security shortfalls and provides expertise in support of the mitigation and remediation assistance process. The Section also supports exercises, software development assurance and purple teaming activities.

The Penetration Testing Section manages and conducts tailored penetration testing activities against NATO networks and systems, with the objective to assess the impact of current cyber threats, as well as, their likelihood and difficulty of exploitation, on NATO CIS, a NATO Mission or NATO's cyber defenses by emulating an intermediate or advanced cyber adversary. These unique activities are performed in support of accreditation, IT change management and software development assurance throughout the lifecycle of NATO CIS, during NATO exercises and in support of incident handling and recovery.

SCOPE OF WORK To support the NCSC with the execution of tasks identified in the subject work package of the service, NCIA is looking for support in order to respond to the increasing demand for high quality security assessments and expertise. This contract is to provide consistent support on a deliverable-based (completion-type) contract, for NCSC to contribute to its POW, based on the deliverables that are described below. Being part of the Penetration Testing Section and under the direction of the Team Lead, the Contractor personnel will deliver following services:

  • Providing Web, infrastructure and application level penetration testing, including but not limited to COTS software and NOTS/GOTS software (NATO/Government off the Shelf), following clearly defined methodologies.
  • Participating in kick-off meetings with stakeholders and technical points of contact in order to identify requirements for testing.
  • Following the documented procedures and workflows outlined by the technical leads.
  • Attending team meetings if required.
  • Writing technical reports in fluent English, following defined templates and Reporting Tools.
  • Briefing, at both executive and technical levels, on security reports and testing outcome, including at flag officer level.
  • In case of new vulnerabilities detected for COTS software, following the Responsible Disclosure Process and following-up with vendors and stakeholders.
  • Providing security design reviews to ensure compliance with NATO policies and directives.
  • In co-ordination with the Technical Lead of the Penetration testing team, ensuring proactive collaboration and coordination with internal and external stakeholders.
  • Staying abreast of technological developments relevant to the area of work.
  • Performing any other duties as may be required.

Requirements

Do you have experience in Windows?, Do you have a Bachelor's degree?, * The contractor personnel will be required to have a Bachelor of Science (BSc) degree at a nationally recognized/certified university in a technical subject with substantial Information Technology (IT) content and 3 years post-related experience. As an exception, the lack of a university degree may be compensated by the demonstration of a candidate's particular abilities or experience that are of interest to the NCI Agency; namely, at least 10 years of extensive and progressive experience in the duties related to the functions of this post.

  • Extensive knowledge and experience (at least 3 years) in web application penetration testing.
  • Extensive knowledge and experience (at least 3 years) in IT infrastructure penetration testing.
  • Extensive knowledge and experience (at least 3 years) in network security architecture design.
  • Extensive knowledge and experience (at least 3 years) in assessing security vulnerabilities within OS, software, protocols & networks.
  • Extensive knowledge and experience (at least 3 years) in researching and evaluating security products & technologies.
  • Knowledge in system and network administration of UNIX and Windows systems.
  • Extensive knowledge and experience (at least 3 years) in use of penetration testing tools, techniques, and recognized testing methodologies.
  • Scripting skills in at least one of the following: Python, Go, PowerShell, shell (bash, ksh, csh).
  • Technical knowledge in system and network security, authentication and security protocols, cryptography, application security, as well as, malware infection techniques and protection technologies.
  • Ability to evaluate risks and formulate mitigation plans.
  • Proven ability to brief at executive level on security findings, reports and testing outcome.
  • Proven ability to write clear and structured technical reports including executive summary, technical findings and remediation plan for several different audiences.
  • Language Proficiency: A thorough knowledge of one of the two NATO languages, both written and spoken, is essential and some knowledge of the other is desirable. NOTE: Most of the work of the NCI Agency is conducted in the English language.

Desirable Experience and Education:

  • Professional qualifications: OSCP, OSCE, OSWE, GPEN, CREST Certified Web Application Tester, GXPN, GWAPT or equivalent.
  • Familiarity with risk analysis methodologies.
  • Prior experience of working in an international environment comprising both military and civilian elements.
  • Knowledge of NATO organization, internal structure and resultant relationships.

Apply for this position