Navy Federal Credit Union - Raleigh, NC
posted 4 months ago
The position involves performing penetration testing against systems across Navy Federal Credit Union (NFCU) to identify weaknesses and provide guidance on remediation and prevention. The role encompasses conducting assessments on applications, networks, wireless, and mobile systems, as well as leading red team campaigns. The individual will assess a wide variety of critical systems and applications to discover exploitable risks to the credit union and improve the organization's risk posture. The work is performed under limited supervision, requiring a high level of independence and expertise. The responsibilities include independently managing penetration tests from inception through delivery, which involves scoping assessments, establishing rules of engagement, and designing penetration tests for systems and applications using established assessment frameworks. The candidate will need to account for both common and unique application and system considerations while sourcing and leveraging information such as source code and architecture diagrams to enhance assessment coverage. Coordination and scheduling of testing with engineering teams across the enterprise is essential, along with effectively managing relationships and communicating with these teams before, during, and after testing. As a subject matter expert, the individual will communicate results, preventative measures, and remediation steps to engineering teams, acting as a technical lead for multi-resource engagements. The role requires identifying and prescribing remediation for vulnerabilities in NFCU applications, systems, and networks, leveraging complex tactics including lateral movement, network tunneling/pivoting, credential compromise, and hash cracking. The candidate will lead red team exercises focusing on stealth, long campaigns, social engineering, and realistic threats, enhancing testing by identifying novel attack patterns based on real-world data. The position also involves performing attacks consistent with common threats, such as those outlined in the OWASP top 10, as well as uncommonly observed attacks specific to certain technologies and frameworks. Researching and developing exploits for local and remote targets, crafting proofs of concept, and deploying exploits for both public and novel vulnerabilities are key tasks. The candidate will create and automate custom fuzzing techniques relevant to NFCU technologies and develop custom scripts to check for security requirements specific to individual applications. Communication of complex technical risks to non-technical and executive audiences is crucial, as is employing operational security best practices to minimize the distribution of vulnerability data. Mentoring and supporting more junior staff across the security organization is also part of the role.