Penetration Tester Team Lead

Leidos, Inc.
Ashburn, United States of America
3 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior
Compensation
$ 237K

Job location

Ashburn, United States of America

Tech stack

Kubernetes Security
Microsoft Windows
Microsoft Active Directory
API
Software System Penetration Testing
Bash
Burp Suite
Cloud Computing
Information Systems
Linux
Identity and Access Management
Intrusion Detection and Prevention
Python
Local Area Networks
Network Architecture
NMap
Powershell
Red Team (Cyber Security)
Ruby
Security Information and Event Management
Wide Area Networks
Web Applications
Data Logging
Scripting (Bash/Python/Go/Ruby)
Mitre Att&ck
Cyber Threat Analysis
HybridCloud
Metasploit
Cybercrime
Purple Team (Cyber Security)
Network Server
Serverless Computing

Job description

The U.S.Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S.Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The CBP SOCis responsible fortheoverall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed securityviolations., * Responsible for managing the team of Penetration Testers, penetration tests, theschedulingand coordination ofpentests,

  • Lead and execute advanced penetration testing, purple team engagements, andred team engagements across complex enterprise environments, including internal/external network infrastructure,Active Directory domains, APIs,hybrid cloud architectures,and on-prem systems.
  • Develop,coordinateandenforce Rules of Engagement (ROE) for penetration tests,lead stakeholder planning sessions to define scope and constraintsof upcomingpentests,and deliver clear, actionableoutbriefingson findings, impact, and remediation to technical and executive audiences.
  • Develop,modify, and deploy custom exploits, payloads, and tooling, including scripting in Python,Ruby,PowerShell, Bash, andother languagesto bypass security controls, automate attack paths, and enhance tradecraft.
  • Conduct penetration testing activities aligned with CBP and industry best practices.
  • Provide real-time technical mentorship during engagements, including pairedtesting, whiteboarding attack paths, and guiding junior testers through exploitation chainsand industry best practices.
  • Maintain accountability for engagement quality and technical depth, reviewing findings,validatingexploit paths, and ensuring reports accurately reflect risk, attack feasibility,potentialimpacts, and recommended remediations.
  • Conduct technical oversight and quality assurance across all engagements, reviewing testing approaches,validatingexploit chains, and ensuring consistency inmethodology, depth, and reporting standards across the teamand engagements.
  • Lead purple team collaboration effortsfrom thepentestperspective, working directly withthe CBP SOC,detection engineering team, and Cyber Threat Hunt teamtoexecute actions designed tovalidatedetections, tune SIEM use cases, and improve defensive posture.
  • Mentor and develop team members through structured andad hoctechnical coaching, raising the overall capability of the team whilemaintainingindividual technicalskillsets and experience.
  • Utilize the MITRE ATT&CK framework to understandand emulateTTPs of adversaries, threat actors, APTs, and threats targetingCBPand mapoperationsto ATT&CK techniques and sub-techniques.
  • Create detailed reports listing vulnerabilitiesidentifiedduringpentests, with actionable mitigation recommendations following completion ofpentestengagements.
  • Stay actively engaged in emerging vulnerability research, exploit techniques, and adversary methodologies, rapidly integrating new capabilities into both personal and team operations.
  • Foster a high-performance, technically rigorous team culture, driving continuous learning through labs, internal exercises, and knowledge-sharing sessions whilenurturingcutting-edgeoffensive skillsets.

Requirements

Weareseekinga highly skilled and experienced PenetrationTesting Team Leadto join our team supportingCBP.As the leader of this highly technical Penetration Testing Team supporting CBP, youwill be responsible formanaging theday-to-dayoperations of the team,coordinating efforts of the team, leading by example, andconducting comprehensive security assessments ofCBPFISMA systems with the purpose of identifying vulnerabilities and providing actionable recommendations to enhance the security posture of CBP's critical systems and networks. This role requires a deep understanding of offensive cybersecurity techniques, strong analytical capabilities, detailed report writing skills and the ability toleada teamofskilled penetration testers., T5:Candidate shall have a minimum of a Bachelors andtwelve(12) years of professional experiencepenetration testing, red teaming, or offensive securityexperience,with a minimum of four (4) years of experience directly leading a Penetration Testing Team.Additional years of experience can be accepted in lieu of degree., T6:Candidate shall have a minimum ofa Bachelors and fifteen(15) years of professional experiencepenetration testing, red teaming, or offensive securityexperience,with a minimum of four (4) years of experience directly leading a Penetration Testing Team.Additional years of experience can be accepted in lieu of degree.

  • Must have an active TS/SCI.
  • Demonstratedexpertisein multi-layer exploitation, with the ability toidentify, chain, and execute attacks across network infrastructure, operating systems (Windows/Linux), web applications, APIs, and cloud platforms; proven capability to move frominitialaccess through full domain or environment compromise.
  • Proficiencywith offensive security tooling and frameworks, including Cobalt Strike, Mythic, Sliver, Metasploit, Burp Suite Pro,BloodHound, Nmap, and similar toolswith specificexperiencemodifyingand extending tools to evade controls.
  • Strong understanding of enterprise networking and protocolswith theability toenumerate, pivot, and exploit across complex, segmented network environments.
  • Hands-on experience with cloud and modern infrastructure security, familiarity with IAM abuse, privilege escalation, token theft, insecure configurations, and lateral movement within cloud-native services and hybrid environments.
  • In-depth knowledge of operating systems and security controls, including Windows/Linuxinternals, endpoint protections, logging mechanisms, and common defensive controlswith ademonstrated ability to bypass or evade these protections during engagements.
  • Proven leadership and team management experience, including leading technical teams through complex engagements, mentoring junior and mid-level testers, conducting quality assurance on deliverables, and managing multiple concurrent assessments without sacrificing technical depth.
  • Strong communicationskills, with the ability to clearly articulate complex technical findings, attack paths, and risk implications to both technical stakeholders and executive leadership through written reports and verbal briefings
  • Must be a US Citizen
  • Must be able to travel to the Ashburn VA office location up to 5 days per week

Core Certifications: At least one certificationfrom thebelowlist:

  • OSCP
  • OSCE
  • OSWP
  • OSEE
  • GPEN
  • GISF
  • GXPN
  • GWAPT

Clearance:

  • All CBP SOC employeesare required tofavorably pass a 5-year Background Investigation(BI)
  • The candidate must currentlypossessaTop SecretClearance with the ability to obtain a Top Secret/SCI Clearance, * Experience conducting full-scope red team operations and adversary emulation campaigns.
  • Familiarity with MITRE ATT&CK framework and threat-informed testing methodologies.
  • Knowledge of container and Kubernetes security testing.
  • Prior experience supporting federal or regulated environments.

If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 - and moving faster than anyone else dares.

Benefits & conditions

Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available at www.leidos.com/careers/pay-benefits .

About the company

Leidos is an industry and technology leader serving government and commercial customers with smarter, more efficient digital and mission innovations. Headquartered in Reston, Virginia, with 47,000 global employees, Leidos reported annual revenues of approximately $16.7 billion for the fiscal year ended January 3, 2025. For more information, visit www.Leidos.com .

Apply for this position