Deadline Date: Tuesday 15 July 2025
Requirement: Penetration Testing Service - NPCL Support
Location: Mons, BE
Full Time On-Site: Yes
Time On-Site: 100%
Period of Performance: As soon as possible but not later than 25 August 2025 until 31 December 2025 with possibility to exercise the following options:
2026 Option: 1st January until 31st December 2026
2027 Option: 1st January until 31st December 2027
2028 Option: 1st January until 31st December 2028
Required Security Clearance: NATO SECRET
1. PURPOSE
The objective of this statement of work (SoW) is to outline the scope of work and deliverables for the penetration testing service to be conducted by the selected company.
The purpose of the work package is to provide support to NATO Cyber Security Centre (NCSC) to fulfil identified penetration testing activities more effectively.
2. BACKGROUND
To support the NCSC with the execution of tasks identified in the subject work package of the service, the NCI Agency is looking for experienced penetration testing professionals to augment the existing teams in order to respond to the increasing demand for high quality security assessments and expertise.
This contract is to provide consistent support on a deliverable-based (completion-type) contract, to NCSC contributing to its POW based on the deliverables that are described in the scope of work below.
3. SCOPE OF WORK
The “Senior Penetration Tester” is a position within the NATO Communications and Information Agency (NCIA), an organization of the North Atlantic Treaty Organization (NATO).
The NCIA has been established with a view to meeting to the best advantage the collective requirements of some or all NATO nations in the fields of capability delivery and service provision related to Consultation, Command & Control as well as Communications, Information and Cyber Defence functions, thereby also facilitating the integration of Intelligence, Surveillance, Reconnaissance, Target Acquisition functions and their associated information exchange.
The NCI Agency NATO Cyber Security Centre (NCSC) is responsible for planning and executing all lifecycle management activities for cyber security. In executing this responsibility, NCSC provides specialist cyber security-related services covering the spectrum of scientific, technical, acquisition, operations, maintenance, and sustainment support, throughout the lifecycle of NATO Information Communications and Technology (ICT).
Within the NCSC, the Assess Branch performs comprehensive vulnerability assessments, penetration testing, security compliance audits and red teaming activities against NATO CIS components throughout their lifecycle and across the NATO CIS footprint, improving its cyber hygiene while contributing to the CIS accreditation, IT change management and cyber incident response and recovery processes. It reports on security shortfalls and provides expertise in support of the mitigation and remediation assistance process. The Section also supports exercises, software development assurance and purple teaming activities.
The Penetration Testing Section manages and conducts tailored penetration testing activities against NATO networks and systems, with the objective to assess the impact of current cyber threats, as well as, their likelihood and difficulty of exploitation, on NATO CIS, a NATO Mission or NATO’s cyber defences by emulating an intermediate or advanced cyber adversary. These unique activities are performed in support of accreditation, IT change management and software development assurance throughout the lifecycle of NATO CIS, during NATO exercises and in support of incident handling and recovery.
Being part of the Penetration Testing Section and under the direction of the Team Lead, the Senior Penetration Tester will perform the following activities:
• Provide Web, infrastructure and application level penetration testing, including but not limited to COTS software and NOTS/GOTS software (NATO/Government off the Shelf), following clearly defined methodologies.
• Participate in kick-off meetings with stakeholders and technical points of contact in order to identify requirements for testing.
• Follow the documented procedures and workflows outlined by the technical leads
• Attend team meetings if required
• Write technical reports in fluent English, following defined templates and Reporting Tools.
• Brief at both executive and technical levels on security reports and testing outcome, including at flag officer level.
• In case of new vulnerabilities detected for COTS software, follow the Responsible Disclosure Process and follow-up with vendors and stakeholders.
• Provide security design reviews to ensure compliance with NATO policies and directives.
• In co-ordination with the Technical Lead of the Penetration testing team, ensure proactive collaboration and coordination with internal and external stakeholders.
• Stay abreast of technological developments relevant to the area of work.
• Perform any other duties as may be required.
The measurement of execution for this work is sprints, with each sprint planned for a duration of 1 week.
4. DELIVERABLES AND PAYMENT MILESTONES
The following deliverables are expected from the work on this SoW in 2025:
Deliverable: 17 sprints
Payment Milestones: Upon completion of each 4 sprints acceptance (and at the end of the work).
The NCIA reserves the possibility to exercise a number of options in the year 2025, based on the same scrum deliverable timeframe and cost, at a later time, depending on the project priorities and requirements.
The payment shall be dependent upon successful acceptance of the Delivery Acceptance Sheet (DAS) – (Annex B).
Invoices shall be accompanied with a Delivery Acceptance Sheet (Annex B) signed by the Contractor and the project authority.
5. COORDINATION AND REPORTING
The contractor shall participate in daily status update meetings, activity planning and other meetings as instructed, physically in the office, or in person via digital means using conference call capabilities, according to the manager’s / team leader’s instructions.
For each sprint to be considered as complete and payable, the contractor must report the outcome of his/her work during the sprint, first verbally during the retrospective meeting and then in written within three (3) days after the sprint’s end date. The format of this report shall be a short email to the NCI Agency Project Manager mentioning briefly the work held and the development achievements during the sprint.
At the end of the project, the Contractor shall provide a Project Closure Report that is summarizing the activities during the period of performance at high level.
6. SCHEDULE
This task order will be active immediately after signing of the contract by both parties.
The period of performance is as soon as possible but not later than 25 August 2025 and will end no later than 22 December 2025.
7. CONSTRAINTS
All the deliverables provided under this statement of work will be based on NCI Agency templates or agreed with the project point of contact.
All documentation will be stored under configuration management and/or in the provided NCI Agency tools.
8. SECURITY AND NON-DISCLOSURE AGREEMENT
It is mandatory to have the candidate be in possession of a NATO SECRET security clearance to facilitate follow-on engagements and coordination at NATO venues.
The signature of a Non-Disclosure Agreement between the contractor contributing to this task and NCIA will be required prior to execution.
9. PRACTICAL ARRANGEMENTS
The contractor will be required to work approximately 80% onsite in Mons / BEL as part of this engagement. The NCSC Team is located in Mons / BEL, with working hours to be adjusted accordingly.
The contractor will be required to work within a NATO country, following the rules and regulations applicable for the operations of NATO CIS.
The contractor may be required to travel to other NATO locations as part of his role. Travel expenses for missions to other NATO/NCIA locations rather than Mons / BEL will be reimbursed to the individual directly (outside this contract) under NATO rules.
Regular travel costs to and from main location of the work (NATO HQ) are out of scope and will be borne by the contractor.
This work must be accomplished by one contractor.
The Purchaser will provide the contractor with the following Purchaser-Furnished Equipment (PFE):
• Access to NATO sites, as required, for the purpose of executing this SOW.
• Workspace (needed business IT for both on- and off-site work, hot-desk at NCSC facility).
• NCIA “REACH” laptop to be used by the contractor for the execution of the contract.
10. REQUIRED PROFILE
[See Requirements]
11. DESIRABLE PROFILE
[See Requirements]
Requirements
8. SECURITY AND NON-DISCLOSURE AGREEMENT
* It is mandatory to have the candidate be in possession of a NATO SECRET security clearance to facilitate follow-on engagements and coordination at NATO venues.
10. REQUIRED PROFILE
Mandatory Experience and Education:
* You will be required to have a Bachelor of Science (BSc) degree at a nationally recognised/certified university in a technical subject with substantial Information Technology (IT) content and 3 years post-related experience. As an exception, the lack of a university degree may be compensated by the demonstration of a candidate’s particular abilities or experience that are of interest to the NCI Agency; namely, at least 10 years of extensive and progressive experience in the duties related to the functions of this post.
* Extensive knowledge and experience (at least 3 years) in web application penetration testing
* Extensive knowledge and experience (at least 3 years) in IT infrastructure penetration testing
* Extensive knowledge and experience (at least 3 years) in network security architecture design
* Extensive knowledge and experience (at least 3 years) in assessing security vulnerabilities within OS, software, protocols & networks
* Extensive knowledge and experience (at least 3 years) in researching and evaluating security products & technologies
* Knowledge in system and network administration of UNIX and Windows systems
* Extensive knowledge and experience (at least 3 years) in use of penetration testing tools, techniques, and recognized testing methodologies
* Scripting skills in at least one of the following: Python, Go, PowerShell, shell (bash, ksh, csh)
* Technical knowledge in system and network security, authentication and security protocols, cryptography, application security, as well as, malware infection techniques and protection technologies.
* Ability to evaluate risks and formulate mitigation plans.
* Proven ability to brief at executive level on security findings, reports and testing outcome.
* Proven ability to write clear and structured technical reports including executive summary, technical findings and remediation plan for several different audiences.
* Language Proficiency: A thorough knowledge of one of the two NATO languages, both written and spoken, is essential and some knowledge of the other is desirable. NOTE: Most of the work of the NCI Agency is conducted in the English language.
11. DESIRABLE PROFILE
* Professional qualifications: OSCP, OSCE, OSWE, GPEN, CREST Certified Web Application Tester, GXPN, GWAPT or equivalent
* Familiarity with risk analysis methodologies.
* Prior experience of working in an international environment comprising both military and civilian elements.
* Knowledge of NATO organization, internal structure and resultant relationships.
* Prior experience of working in an international environment comprising both military and civilian elements.
* Knowledge of NATO organization, internal structure and resultant relationships.