drjobs Senior Penetration Tester

Senior Penetration Tester

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Mons - Belgium

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Spektrum have a wide range of exciting opportunities in several global locations.

We are always looking to add great new talent to our team and look forward to hearing from you.

Spektrum supports apex purchasers (NATO UN EU and National Government and Defence) and their Tier 1 supplier ecosystem with a wide range of specialist services. We provide our clients with professional services specialised aerospace and defence sales delivery and operational subject matter expertise. We are looking for personnel to join our team and support key client projects.

Who we are supporting

The NATO Communication and Information Agency (NCIA) is responsible for providing secure and effective communications and information technology (IT) services to NATOs member countries and its partners. The agency was established in 2012 and is headquartered in Brussels Belgium.

The NCIA provides a wide range of services including:

  • Cyber Security: The NCIA provides advanced cybersecurity solutions to protect NATOs communication networks and information systems against cyber threats.
  • Command and Control Systems: The NCIA develops and maintains the systems used by NATOs military commanders to plan and execute operations.
  • Satellite Communications: The NCIA provides satellite communications services to enable secure and reliable communications between NATO forces.
  • Electronic Warfare: The NCIA provides electronic warfare services to support NATOs mission to detect deny and defeat threats to its communication networks.
  • Information Management: The NCIA manages NATOs information technology infrastructure including its databases applications and servers.

Overall the NCIA plays a critical role in ensuring the security and effectiveness of NATOs communication and information technology capabilities.

The program

Assistance and Advisory Service (AAS)

The NATO Communications and Information Agency (NCI Agency) is NATOs principal C3 capability deliverer and CIS service provider. It provides maintains and defends the NATO enterprise-wide information technology infrastructure to enable Allies to consult together under Article IV and when required stand together in the face of attack under Article V.

To provide these critical services in the modern evolving dynamic environment the NCI Agency needs to build and maintain high performance-engaged workforce. The NCI Agency workforce strategically consists of three major categorises: NATO International Civilians (NIC)s Military (Mil) and Interim Workforce Consultants (IWC)s. The IWCs are a critical part of the overall NCI Agency workforce and make up approximately 15 percent of the total workforce.

Role ID 2025-0203

Role Background

To support the NCSC with the execution of tasks identified in the subject work package of the service the NCI Agency is looking for experienced penetration testing professionals to augment the existing teams in order to respond to the increasing demand for high quality security assessments and expertise

The NCIA has been established with a view to meeting to the best advantage the collective requirements of some or all NATO nations in the fields of capability delivery and service provision related to Consultation Command & Control as well as Communications Information and Cyber Defence functions thereby also facilitating the integration of Intelligence Surveillance Reconnaissance Target Acquisition functions and their associated information exchange.

The NCI Agency NATO Cyber Security Centre (NCSC) is responsible for planning and executing all lifecycle management activities for cyber security. In executing this responsibility NCSC provides specialist cyber security-related services covering the spectrum of scientific technical acquisition operations maintenance and sustainment support throughout the lifecycle of NATO Information Communications and Technology (ICT).

Within the NCSC the Assess Branch performs comprehensive vulnerability assessments penetration testing security compliance audits and red teaming activities against NATO CIS components throughout their lifecycle and across the NATO CIS footprint improving its cyber hygiene while contributing to the CIS accreditation IT change management and cyber incident response and recovery processes. It reports on security shortfalls and provides expertise in support of the mitigation and remediation assistance process. The Section also supports exercises software development assurance and purple teaming activities.

The Penetration Testing Section manages and conducts tailored penetration testing activities against NATO networks and systems with the objective to assess the impact of current cyber threats as well as their likelihood and difficulty of exploitation on NATO CIS a NATO Mission or NATOs cyber defences by emulating an intermediate or advanced cyber adversary. These unique activities are performed in support of accreditation IT change management and software development assurance throughout the lifecycle of NATO CIS during NATO exercises and in support of incident handling and recovery

Role Duties and Responsibilities

  • Provide Web infrastructure and application level penetration testing including but not limited to COTS software and NOTS/GOTS software (NATO/Government off the Shelf) following clearly defined methodologies.
  • Participate in kick-off meetings with stakeholders and technical points of contact in order to identify requirements for testing.
  • Follow the documented procedures and workflows outlined by the technical leads Attend team meetings if required
  • Write technical reports in fluent English following defined templates and Reporting Tools.
  • Brief at both executive and technical levels on security reports and testing outcome including at flag officer level.
  • In case of new vulnerabilities detected for COTS software follow the Responsible
  • Disclosure Process and follow-up with vendors and stakeholders.
  • Provide security design reviews to ensure compliance with NATO policies and directives.
  • In co-ordination with the Technical Lead of the Penetration testing team ensure proactive collaboration and coordination with internal and external stakeholders.
  • Stay abreast of technological developments relevant to the area of work.
  • Perform any other duties as may be required.

Essential Skills Experience and Certifications

  • Extensive knowledge and experience (at least 3 years) in the following areas:
  • Web application penetration testing
  • IT infrastructure penetration testing
  • Network security architecture design
  • Assessing security vulnerabilities within OS software protocols & networks
  • Researching and evaluating security products & technologies
  • Knowledge in system and network administration of UNIX and Windows systems
  • Use of penetration testing tools techniques and recognized testing methodologies
  • Scripting skills in at least one of the following: Python Go PowerShell shell (bash ksh csh)
  • Technical knowledge in system and network security authentication and security protocols cryptography application security as well as malware infection techniques and protection technologies.
  • Ability to evaluate risks and formulate mitigation plans.
  • Proven ability to brief at executive level on security findings reports and testing outcome.
  • Proven ability to write clear and structured technical reports including executive summary technical findings and remediation plan for several different audiences

Desirable Skills Experience and Certifications

  • Professional qualifications: OSCP OSCE OSWE GPEN CREST Certified Web Application Tester GXPN GWAPT or equivalent
  • Familiarity with risk analysis methodologies.
  • Prior experience of working in an international environment comprising both military and civilian elements.
  • Knowledge of NATO organization internal structure and resultant relationships.
  • Prior experience of working in an international environment comprising both military and civilian elements.
  • Knowledge of NATO organization internal structure and resultant relationships.

Education

  • You will be required to have a Bachelor of Science (BSc) degree at a nationally recognised/certified university in a technical subject with substantial Information Technology (IT) content and 3 years post-related experience.
  • As an exception the lack of a university degree may be compensated by the demonstration of a candidates particular abilities or experience that are of interest to the NCI Agency; namely at least 10 years of extensive and progressive experience in the duties related to the functions of this post

Language Proficiency

  • A thorough knowledge of one of the two NATO languages both written and spoken is essential and some knowledge of the other is desirable. (English and French)

Working Location

  • Mons Belgium

Working Policy

  • On-Site

Travel

  • Some travel to other NATO sites may be required

Security Clearance

  • Valid National or NATO Secret personal security clearance

We never know what new opportunities might be just over the horizon. If this opportunity isnt for you please feel free to send us your resume anyway and be the first to know if something suitable for your skills and experience comes up.


Required Experience:

Senior IC

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.