top of page
hush-naidoo-jade-photography-ZCO_5Y29s8k-unsplash_edited.jpg

Cyber Test Team Lead

PARTNER COMPANY

FTI

ENGAGEMENT TYPE

In-Person

LOCATION

Norfolk, VA

Opportunity Description

Overview


At FTI, we are united by one common mission; supporting those that protect our nation so they can make the best-informed decisions during critical moments when seconds count. We want you to bring your passion and expertise to contribute to that essential mission.  We strive to incorporate our values to create a culture of collaboration and trust, where you can share your ideas and innovate.  If you are inspired by making a positive impact through developing data driven solutions, FTI would appreciate the opportunity to learn more about you.


FTI has an exciting opportunity for a Penetration Testing Team Lead for the Operational Test & Evaluation (OT&E) of the Department of the Navy’s, Operational Test and Evaluation Force in Norfolk, VA.   This is a rare opportunity to provide leadership to a truly elite team of penetration testers, who support national security by identifying vulnerabilities in applications, systems, and networks through rigorous testing.



Responsibilities


  • Provide management support to prepare and lead cyber test execution events for cooperative vulnerability penetration assessments and adversarial assessments in support of the OPTEVFOR cyber mission.

  • Provide leadership  support during penetration tests on applications, systems, and networks utilizing OPTEVFOR Cyber Operational Test & Evaluation policies, guidance and procedures to meet deadlines.

  • Supervise, manage, and motivate team members daily.

  • Capable of conducting penetration tests on applications, systems, and network utilizing proven/formal processes and industry standards.

  • Facilitate open source research and system under test documentation review to familiarize with the system’s mission, architecture and interfaces including critical components to identify its attack surface and threat vectors.

  • Attend site visits and conduct manual examination of system and network configurations, system logs, and devices.

  • Observe, collect, analyze, and review cybersecurity data, document tests and test results.

  • Research various cyber TTPs, organizational structures, capabilities, personas, and environments, and integrate findings into Cyber Survivability test planning and execution.

  • Facilitate the development and utilization of program specific testing methodology for threat emulation and vulnerability validation.

  • Support cyber toolset development, improvement and validation.

  • Develop test briefs and present to the OPTEVFOR cyber division leadership.

  • Participate in capture the flag events, cyber off sites, external engagements such as red team huddles and red team technical exchange meetings; develop required products and materials in support of these events.


Education/Qualifications


Required:

  • Must have active U.S. Secret security clearance with eligibility to obtain U.S. Top Secret/SCI security clearance.

  • Bachelor’s degree in Computer Science, Cybersecurity, Engineering or related fields / experience.

  • 10+ years of combined experience including

    • Project Management

    • Team Leadership

    • Penetration Testing (minimum of 1+ year of practical experience).

    • IT network or system administration

  • Experience planning and executing concurrent, complex projects.

  • Experience collaborating effectively with management, staff, vendors, and external consultants.

  • Strong written and oral communication skills to clearly articulate technical information and outcomes to senior level leadership.

  • Ability to support 25% CONUS travel is expected with this role; OCONUS travel is rare.

    • Missions are typically 1-2 weeks.

  • Expertise in Microsoft Office programs.

Preferred:

  • U.S. Top Secret/SCI Security Clearance.

  • DoD / Navy IT environment experience.

  • Proficient in at least one Operating Systems to include: Windows, Linux and Unix variants, embedded and Real-Time Operating Systems.

  • Proficient in multiple offensive tools/technologies to include: Metasploit, Cobalt Strike, Core Impact, Burp Suite, SDR, Wireless, Intercepting Proxies, etc.

bottom of page