At a Glance
- Tasks: Secure IoT and SaaS ecosystems through penetration testing and vulnerability management.
- Company: Global tech leader focused on innovative solutions across various industries.
- Benefits: Competitive salary, flexible working, and opportunities for professional growth.
- Why this job: Join a dynamic team to protect cutting-edge technology and make a real impact.
- Qualifications: 4+ years in security roles with expertise in IoT and SaaS testing.
- Other info: Collaborative culture that values innovation and continuous learning.
The predicted salary is between 55000 - 70000 £ per year.
Camlin is a global technology leader that operates with the vision of bringing revolutionary products to life for a wide range of industries, including power and rail, and also has interests in a number of R&D projects in a variety of scientific sectors. At Camlin we believe in high quality engineering and design, allowing us to develop market leading products and services. In short, we love creating value for our customers by solving difficult problems. As of now, Camlin operates in over 20 countries worldwide.
As a Penetration Tester (SaaS and IoT) at Camlin, you will be a key person in the defence of our IoT and SaaS ecosystem. This is a hybrid offensive and defensive role where you will secure everything from "IoT to Cloud." You will partner with Engineering, QA, and DevSecOps to validate security is built into the release process. We are looking for a technical expert who is pro-active in identifying exploitable vulnerabilities with the ability to collaborate and communicate with stakeholders to provide a satisfactory resolution.
Key Responsibilities- SaaS Security Testing
- Web & API Penetration Testing: Conduct manual and automated testing of SaaS platforms and backend APIs against the OWASP Top 10 and API Security Top 10.
- Cloud Infrastructure Review: Assess AWS/Azure environments for misconfigurations, IAM over-privileging, and container security vulnerabilities.
- Vulnerability Management: Simulate real-world cyberattacks to identify weaknesses in SaaS infrastructures before exploitation.
- Platform Level – Embedded Web-applications Device Interface Testing: USB, Ethernet, Serial (UART/RS232/RS485).
- Radio Frequency (RF) & Wireless Security: Standard Comms Protocols e.g. WiFi, Bluetooth.
- Cryptographic Verification: Ensuring latest cryptographic protocols and secure configuration.
- Compliance Alignment: Validate products against international standards including IEC 62443-4-1/4-2, the EU Cyber Resiliency Act (CRA), and the Radio Equipment Directive (RED).
- Design & Architecture: Collaborate with Product and Engineering teams to embed security controls during the design phase, providing expert guidance on secure architecture.
- Automated Testing: Collaborate on SAST, DAST, and SCA tools (e.g., Snyk, Checkmarx, Burp Suite) within CI/CD pipelines.
- Remediation Support: Document findings in clear technical reports and provide developers with actionable code-level recommendations.
- Create, update, and maintain tickets related to security findings and testing outcomes.
- Produce clear technical documentation, including assessment reports, remediation guidance, and architectural security recommendations.
4+ years in a technical security role (Penetration Tester, AppSec Engineer, or Security-focused Developer). Proven expertise in testing both hardware/firmware (IoT) and web-based platforms (SaaS). Scripting Proficiency: Ability to automate tasks using Python, Bash, or similar. Tooling Mastery: Expertise with Burp Suite, Metasploit, Nmap, and hardware-specific tools (Ghidra, Frida, Objection). Certifications: OSCP, CREST (CRT/CCT), or GPEN (highly regarded).
Nice to have but not essential
- Deep understanding of Linux (Yocto)/Windows internals and modern application architectures.
- Experience with peripheral standards (I2C, SPI, PCI, PCIe, RS422, RS485, RS232, SATA, PATA, MMC).
- Familiarity with Agile methodologies and DevSecOps practices.
- Working knowledge of security standards (OWASP, NIST, ISO 27001).
- AWS Security Toolchain.
Our Values
- We work together
- We believe in people
- We won't accept the 'way it has always been done'
- We listen to learn
- We're trying to do the right thing
Equal Employment Opportunity Statement: Individuals seeking employment at Camlin are considered without regards to race, colour, religion, national origin, age, sex, marital states, ancestry, physical or mental disability, gender identity or sexual orientation.
Penetration Tester employer: Camlin
Contact Detail:
Camlin Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Penetration Tester
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and connect with current Camlin employees on LinkedIn. A friendly chat can sometimes lead to opportunities that aren’t even advertised!
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your penetration testing projects or any relevant work. This gives you a chance to demonstrate your expertise beyond just words on a CV.
✨Tip Number 3
Prepare for the interview by brushing up on your technical knowledge and soft skills. Be ready to discuss your experience with tools like Burp Suite and Metasploit, and how you’ve tackled real-world security challenges.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people at Camlin. Plus, it shows you’re genuinely interested in joining our team!
We think you need these skills to ace Penetration Tester
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Penetration Tester role. Highlight your relevant experience in SaaS and IoT security, and don’t forget to mention any specific tools or certifications that match what we’re looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about security and how your skills can help us at Camlin. Be sure to mention any past experiences that relate directly to the responsibilities outlined in the job description.
Show Off Your Technical Skills: We want to see your technical prowess! Include specific examples of your work with penetration testing tools like Burp Suite or Metasploit, and any scripting you've done in Python or Bash. This will help us understand your hands-on experience.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team at Camlin!
How to prepare for a job interview at Camlin
✨Know Your Tools Inside Out
Make sure you're well-versed in the tools mentioned in the job description, like Burp Suite and Metasploit. Practise using them in real-world scenarios so you can confidently discuss your experience during the interview.
✨Brush Up on Security Standards
Familiarise yourself with OWASP, NIST, and ISO 27001 standards. Be prepared to explain how these frameworks apply to the role and how you've implemented them in past projects.
✨Demonstrate Your Problem-Solving Skills
Camlin values innovative solutions, so come prepared with examples of how you've tackled complex security challenges. Use the STAR method (Situation, Task, Action, Result) to structure your responses.
✨Show Your Collaborative Spirit
Since this role involves working closely with Engineering and DevSecOps teams, be ready to discuss your experience in cross-functional collaboration. Highlight any successful projects where teamwork led to improved security outcomes.