Penetration Testing Team Lead

Nabout Leidos
4 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior
Compensation
$ 237K

Job location

Tech stack

Microsoft Windows
API
Software System Penetration Testing
Burp Suite
Cloud Computing
Linux
Network Architecture
NMap
Web Applications
Metasploit
Vulnerability Analysis

Job description

We are seeking a highly skilled and experienced Penetration Testing Team Lead to join our team supporting CBP. As the leader of this highly technical Penetration Testing Team supporting CBP, you will be responsible for managing the day-to-day operations of the team, coordinating efforts of the team, leading by example, and conducting comprehensive security assessments of CBP FISMA systems with the purpose of identifying vulnerabilities and providing actionable recommendations to enhance the security posture of CBP's critical systems and networks. This role requires a deep understanding of offensive cybersecurity techniques, strong analytical capabilities, detailed report writing skills and the ability to lead a team of skilled penetration testers.

Requirements

T5: Candidate shall have a minimum of a Bachelors and twelve (12) years of professional experience penetration testing, red teaming, or offensive security experience, with a minimum of four (4) years of experience directly leading a Penetration Testing Team. Additional years of experience can be accepted in lieu of degree.\n, T6: Candidate shall have a minimum of a Bachelors and fifteen (15) years of professional experience penetration testing, red teaming, or offensive security experience, with a minimum of four (4) years of experience directly leading a Penetration Testing Team. Additional years of experience can be accepted in lieu of degree.\n, * Demonstrated expertise in multi-layer exploitation, with the ability to identify, chain, and execute attacks across network infrastructure, operating systems (Windows/Linux), web applications, APIs, and cloud platforms; proven capability to move from initial access through full domain or environment compromise.\n, * Proficiency with offensive security tooling and frameworks, including Cobalt Strike, Mythic, Sliver, Metasploit, Burp Suite Pro, BloodHound, Nmap, and similar tools with specific experience modifying and extending tools to evade controls.\n, * Strong communication skills, with the ability to clearly articulate complex technical findings, attack paths, and risk implications to both technical stakeholders and executive leadership through written reports and verbal briefings\n

  • Must be a US Citizen\n
  • Must be able to travel to the Ashburn VA office location up to 5 days per week\n, * The candidate must currently possess a Top Secret Clearance with the ability to obtain a Top Secret/SCI Clearance\n

Benefits & conditions

n \nPrimary Responsibilities: \n \n \n \n

  • Responsible for managing the team of Penetration Testers, penetration tests, the scheduling and coordination of pentests,\n

\n \n \n

  • Lead and execute advanced penetration testing, purple team engagements, and red team engagements across complex enterprise environments, including internal/external network infrastructure, Active Directory domains, APIs, hybrid cloud architectures, and on-prem systems.\n

\n \n \n

  • Develop, coordinate and enforce Rules of Engagement (ROE) for penetration tests, lead stakeholder planning sessions to define scope and constraints of upcoming pentests, and deliver clear, actionable outbriefings on findings, impact, and remediation to technical and executive audiences.\n

\n \n \n

  • Develop, modify, and deploy custom exploits, payloads, and tooling, including scripting in Python, Ruby, PowerShell, Bash, and other languages to bypass security controls, automate attack paths, and enhance tradecraft.\n

\n \n \n

  • Conduct penetration testing activities aligned with CBP and industry best practices.\n

\n \n \n

  • Provide real-time technical mentorship during engagements, including paired testing, whiteboarding attack paths, and guiding junior testers through exploitation chains and industry best practices.\n

\n \n \n

  • Maintain accountability for engagement quality and technical depth, reviewing findings, validating exploit paths, and ensuring reports accurately reflect risk, attack feasibility, potential impacts, and recommended remediations.\n

\n \n \n

  • Conduct technical oversight and quality assurance across all engagements, reviewing testing approaches, validating exploit chains, and ensuring consistency in methodology, depth, and reporting standards across the team and engagements.\n

\n \n \n

  • Lead purple team collaboration efforts from the pentest perspective, working directly with the CBP SOC, detection engineering team, and Cyber Threat Hunt team to execute actions designed to validate detections, tune SIEM use cases, and improve defensive posture.\n

\n \n \n

  • Mentor and develop team members through structured and ad hoc technical coaching, raising the overall capability of the team while maintaining individual technical skillsets and experience.\n

\n \n \n

  • Utilize the MITRE ATT&CK framework to understand and emulate TTPs of adversaries, threat actors, APTs, and threats targeting CBP and map operations to ATT&CK techniques and sub-techniques.\n

\n \n \n

  • Create detailed reports listing vulnerabilities identified during pentests, with actionable mitigation recommendations following completion of pentest engagements.\n

\n \n \n

  • Stay actively engaged in emerging vulnerability research, exploit techniques, and adversary methodologies, rapidly integrating new capabilities into both personal and team operations.\n

\n \n \n

  • Foster a high-performance, technically rigorous team culture, driving continuous learning through labs, internal exercises, and knowledge-sharing sessions while nurturing cutting-edge offensive skillsets.\n, * In-depth knowledge of operating systems and security controls, including Windows/Linux internals, endpoint protections, logging mechanisms, and common defensive controls with a demonstrated ability to bypass or evade these protections during engagements.\n

\n \n \n

  • Proven leadership and team management experience, including leading technical teams through complex engagements, mentoring junior and mid-level testers, conducting quality assurance on deliverables, and managing multiple concurrent assessments without sacrificing technical depth.\n

Apply for this position