At a Glance
- Tasks: Join our elite team to simulate real-world cyber threats and enhance security for top clients.
- Company: BreachLock, a global leader in offensive security and penetration testing.
- Benefits: 100% remote work, cutting-edge projects, and a fast-paced, growth-focused environment.
- Why this job: Make a real impact in cybersecurity while working with innovative technologies and top-tier clients.
- Qualifications: 3+ years in red teaming, proficiency in C2 frameworks, and strong scripting skills.
- Other info: Recognised by industry leaders for advancing automated offensive security testing.
The predicted salary is between 48000 - 84000 £ per year.
BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. We provide enterprises with evidence-based risk across their entire attack surface to determine how they will respond to an attack. Our services include Attack Surface Management, Penetration Testing, and Red Teaming.
Join BreachLock’s elite offensive security team, where we don’t just simulate threats — we emulate real adversaries. As a Red Team Specialist, you will be at the frontlines of BreachLock’s offensive security operations, conducting advanced adversary emulation, bypassing modern defenses, and helping Fortune 500 clients improve their cyber resilience.
What You’ll Do:- Plan and execute full-scope red team engagements (TIBER-style, MITRE ATT&CK aligned)
- Perform focused penetration tests on web applications, mobile apps (iOS/Android), APIs, and backend services, as well as traditional network/cloud infrastructure and specialised targets (IoT/OT) when required.
- Simulate APTs using custom tooling and native techniques
- Bypass EDR/XDR and evade detection controls
- Work closely with Blue Teams for purple teaming and adversarial validation
- Deliver executive reports and technical debriefs with precision
- 3+ years in red teaming or offensive security
- Proficiency with C2 frameworks (Cobalt Strike, Sliver, Mythic)
- Deep understanding of Windows/Linux internals, AD, and cloud (AWS/Azure)
- Knowledge of OPSEC, evasive TTPs, and threat intelligence integration
- Strong scripting skills (Python, PowerShell, Bash)
- OSCP, CRTO, OSCE, or similar certs
- Published exploits or open-source tools
- 100% remote-first culture
- Cutting-edge work in PTaaS, AEV, and CTEM
- Clients include global enterprises and governments
- Fast-paced, growth-focused, no-BS environment
- Analyst Endorsements: Recognized again by Gartner, GigaOm, and SANS for advancing automated, AI-enhanced offensive security testing.
- CTEM & AEV Leadership: Launched industry-first AI-powered CTEM and Adversarial Exposure Validation platforms, setting new benchmarks in exposure management.
- GigaOm Leader (2025): Ranked as a Leader and Fast Mover for the second consecutive year in the GigaOm Radar for PTaaS and CTEM.
- Media Spotlight: Featured in Reuters, Cybercrime Magazine, and SecurityWeek for driving measurable outcomes for Fortune 500 clients.
Senior Penetration Tester (RED TEAM) employer: BreachLock, Inc.
Contact Detail:
BreachLock, Inc. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Penetration Tester (RED TEAM)
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and join online forums. The more connections we make, the better our chances of landing that dream role.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your penetration testing projects or any cool tools you've developed. This gives potential employers a taste of what we can bring to the table.
✨Tip Number 3
Prepare for interviews by practising common red team scenarios. We should be ready to discuss our approach to bypassing defences and how we handle real-world threats. Confidence is key!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, it shows we’re genuinely interested in joining the BreachLock team.
We think you need these skills to ace Senior Penetration Tester (RED TEAM)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the role of a Red Team Specialist. Highlight your experience in red teaming, penetration testing, and any relevant certifications. We want to see how your skills align with what we do at BreachLock!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about offensive security and how your background makes you a perfect fit for our team. Let us know what excites you about working with BreachLock.
Showcase Your Skills: Don’t just list your skills; demonstrate them! If you’ve published exploits or contributed to open-source tools, mention them. We love seeing practical examples of your work that show us what you can bring to the table.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates. Plus, it shows you’re keen on joining our team!
How to prepare for a job interview at BreachLock, Inc.
✨Know Your Stuff
Make sure you brush up on your technical skills, especially around C2 frameworks and the MITRE ATT&CK framework. Be ready to discuss your experience with red teaming and penetration testing in detail, as well as any specific tools or techniques you've used.
✨Showcase Your Projects
Bring examples of your work to the interview. If you've published exploits or developed open-source tools, be prepared to talk about them. This not only demonstrates your expertise but also shows your passion for the field.
✨Understand the Company
Research BreachLock and its services thoroughly. Understand their approach to offensive security and be ready to discuss how your skills align with their mission. This will show that you're genuinely interested in the role and the company.
✨Practice Communication
Since you'll be delivering executive reports and technical debriefs, practice explaining complex concepts in simple terms. Being able to communicate effectively with both technical and non-technical audiences is key in this role.