At a Glance
- Tasks: Join our elite team to simulate real-world cyber threats and enhance security for top clients.
- Company: BreachLock, a global leader in offensive security and penetration testing.
- Benefits: 100% remote work, cutting-edge projects, and a fast-paced, growth-focused environment.
- Why this job: Make a real impact in cybersecurity while working with innovative technologies and top-tier clients.
- Qualifications: 3+ years in red teaming, proficiency in C2 frameworks, and strong scripting skills.
- Other info: Recognised by industry leaders for advancing automated offensive security testing.
The predicted salary is between 48000 - 84000 £ per year.
BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. We provide enterprises with evidence-based risk across their entire attack surface to determine how they will respond to an attack. Our services include Attack Surface Management, Penetration Testing, and Red Teaming.
Join BreachLock’s elite offensive security team, where we don’t just simulate threats — we emulate real adversaries. As a Red Team Specialist, you will be at the frontlines of BreachLock’s offensive security operations, conducting advanced adversary emulation, bypassing modern defenses, and helping Fortune 500 clients improve their cyber resilience.
What You’ll Do:- Plan and execute full-scope red team engagements (TIBER-style, MITRE ATT&CK aligned)
- Perform focused penetration tests on web applications, mobile apps (iOS/Android), APIs, and backend services, as well as traditional network/cloud infrastructure and specialised targets (IoT/OT) when required.
- Simulate APTs using custom tooling and native techniques
- Bypass EDR/XDR and evade detection controls
- Work closely with Blue Teams for purple teaming and adversarial validation
- Deliver executive reports and technical debriefs with precision
- 3+ years in red teaming or offensive security
- Proficiency with C2 frameworks (Cobalt Strike, Sliver, Mythic)
- Deep understanding of Windows/Linux internals, AD, and cloud (AWS/Azure)
- Knowledge of OPSEC, evasive TTPs, and threat intelligence integration
- Strong scripting skills (Python, PowerShell, Bash)
- OSCP, CRTO, OSCE, or similar certs
- Published exploits or open-source tools
- 100% remote-first culture
- Cutting-edge work in PTaaS, AEV, and CTEM
- Clients include global enterprises and governments
- Fast-paced, growth-focused, no-BS environment
- Analyst Endorsements: Recognized again by Gartner, GigaOm, and SANS for advancing automated, AI-enhanced offensive security testing.
- CTEM & AEV Leadership: Launched industry-first AI-powered CTEM and Adversarial Exposure Validation platforms, setting new benchmarks in exposure management.
- GigaOm Leader (2025): Ranked as a Leader and Fast Mover for the second consecutive year in the GigaOm Radar for PTaaS and CTEM.
- Media Spotlight: Featured in Reuters, Cybercrime Magazine, and SecurityWeek for driving measurable outcomes for Fortune 500 clients.
Contact Detail:
BreachLock, Inc. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Penetration Tester (RED TEAM)
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and join online forums. The more connections we make, the better our chances of landing that dream role.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your penetration testing projects or any cool tools you've developed. This gives potential employers a taste of what we can bring to the table.
✨Tip Number 3
Prepare for interviews by practising common red team scenarios. We should be ready to discuss our approach to bypassing defences and how we handle real-world threats. Confidence is key!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, it shows we’re genuinely interested in joining the BreachLock team.
How to prepare for a job interview at BreachLock, Inc.
✨Know Your Stuff
Make sure you brush up on your technical skills, especially around C2 frameworks and the MITRE ATT&CK framework. Be ready to discuss your experience with red teaming and penetration testing in detail, as well as any specific tools or techniques you've used.
✨Showcase Your Projects
Bring examples of your work to the interview. If you've published exploits or developed open-source tools, be prepared to talk about them. This not only demonstrates your expertise but also shows your passion for the field.
✨Understand the Company
Research BreachLock and its services thoroughly. Understand their approach to offensive security and be ready to discuss how your skills align with their mission. This will show that you're genuinely interested in the role and the company.
✨Practice Communication
Since you'll be delivering executive reports and technical debriefs, practice explaining complex concepts in simple terms. Being able to communicate effectively with both technical and non-technical audiences is key in this role.