Penetration Tester, Vector Command, Vulnerability Management & External Network
Penetration Tester, Vector Command, Vulnerability Management & External Network

Penetration Tester, Vector Command, Vulnerability Management & External Network

Full-Time 55000 - 70000 £ / year (est.) Home office (partial)
Divvy Cloud Corp.

At a Glance

  • Tasks: Join our team to attack networks and improve client security through innovative penetration testing.
  • Company: Rapid7, a leader in cybersecurity with a dynamic and collaborative culture.
  • Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
  • Other info: Be part of a cutting-edge Red Team operation with excellent career advancement opportunities.
  • Why this job: Make a real impact by simulating attacks and enhancing security for diverse clients.
  • Qualifications: 3+ years in technical security, knowledge of cybersecurity standards, and strong communication skills.

The predicted salary is between 55000 - 70000 £ per year.

Do you enjoy attacking networks? Do you enjoy sifting through large amounts of attack surface, crafting novel attack chains to breach a client’s perimeter, gaining initial access, laterally moving, and demonstrating impact, all while evading security teams and their controls? As a penetration tester on the Global Services team at Rapid7, you will help our clients improve their security posture through your technical skills and knowledge of both offensive and defence strategies.

About the Team

Vector Command is an always-on Red Team operation supporting multiple customers. As part of a specialized team, you will emulate real adversaries by performing large-scale reconnaissance, identifying exposed or high-value assets, and discovering weaknesses that can be leveraged for compromise. After gaining access, the team continues with post-compromise objectives to demonstrate real impact, evade detection, and assess the effectiveness of security controls. This service evaluates far more than vulnerabilities—it tests the customer’s entire security posture and defence-in-depth strategy. In addition to offensive operations, you will support customers through external attack surface analysis, exposure reconnaissance, integration of accounts and tools, preparation of monthly Red Team reports, and prioritization of customer requests. Daily collaboration with Vector Command operators is essential, as is maintaining awareness of new vulnerabilities, shifts in customer attack surfaces, and changes across customer environments.

About the Role

Your primary responsibility is to deliver Rapid7’s Vector Command Continuous Red Teaming service. In this role, you will conduct external network penetration testing and manage vulnerability scan dashboards, exploiting vulnerabilities, identifying the impact of exposures, and then searching for vulnerabilities that automated tooling may miss. The focus is on continuous perimeter testing to identify attack vectors that could lead to a breach. Specifically, your focus will be to:

  • Manage automated vulnerability scan data across numerous customers, identifying and validating vulnerabilities which can be used to gain initial access into an organization.
  • Perform external network penetration testing activities across a large attack surface, searching for vulnerabilities and misconfigurations that automation often misses.
  • Upon successful exploitation, work with your Vector Command team to evaluate the impact through post-compromise breach simulation.
  • Collaborate closely with a team of Red Team operators, participating in daily meetings to establish attack objectives and operational direction.
  • Develop and maintain positive relationships with clients and understand their business and needs.
  • Create additional value for clients through continual insights and consultative advice based on experience with the client, their industry, established standards and leading practices.

The skills and qualities you’ll bring include:

  • 3+ years in an active technical security role.
  • Knowledge of Cybersecurity standards and industry best practices.
  • Bug Bounty experience, identifying novel vulnerabilities in arbitrary internet-facing attack surfaces.
  • The ability to translate technical concepts and convey them to non-security personnel.
  • Technical competencies, including previous technical consulting experience.
  • High quality report writing and peer reviewing.
  • Certifications such as GPEN, CPTS, OSCP, CREST.
  • Experience with Red & Purple Teams.
  • Excellent communication skills both with internal and external stakeholders.
  • Collaborative mindset, contributing to knowledge sharing and cross training.
  • Demonstrate a commitment to the 'end-to-end' testing process, from the initial pre-engagement planning to providing accountable support during the final remediation phase.

Core Value Embodiment: embody our core values to foster a culture of excellence that drives meaningful impact and collective success.

Penetration Tester, Vector Command, Vulnerability Management & External Network employer: Divvy Cloud Corp.

At Rapid7, we pride ourselves on being an exceptional employer that fosters a collaborative and innovative work culture. As a Penetration Tester in our Vector Command team, you will not only enhance your technical skills through continuous learning and exposure to diverse challenges but also enjoy the benefits of a supportive environment that values employee growth and development. Our commitment to excellence and meaningful impact ensures that you will be part of a team that is at the forefront of cybersecurity, making a real difference for our clients.
Divvy Cloud Corp.

Contact Detail:

Divvy Cloud Corp. Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Penetration Tester, Vector Command, Vulnerability Management & External Network

✨Tip Number 1

Network with industry professionals! Attend cybersecurity meetups, conferences, or online forums. Engaging with others in the field can lead to job opportunities and insider knowledge about openings.

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your penetration testing projects, bug bounty findings, or any relevant work. This gives potential employers a taste of what you can do and sets you apart from the crowd.

✨Tip Number 3

Practice makes perfect! Use platforms like Hack The Box or TryHackMe to sharpen your skills. The more you practice, the more confident you'll feel during interviews and real-world scenarios.

✨Tip Number 4

Apply through our website! We love seeing passionate candidates who align with our values. Tailor your application to highlight your experience in offensive security and how you can contribute to our team.

We think you need these skills to ace Penetration Tester, Vector Command, Vulnerability Management & External Network

Penetration Testing
Vulnerability Management
External Network Testing
Cybersecurity Standards Knowledge
Bug Bounty Experience
Technical Consulting
Report Writing
Communication Skills
Collaboration
Red Team Operations
Post-Compromise Simulation
Attack Surface Analysis
Client Relationship Management
Continuous Perimeter Testing
Technical Competencies

Some tips for your application 🫡

Show Off Your Skills: When you're writing your application, make sure to highlight your technical skills and experience in penetration testing. We want to see how you've tackled challenges in the past and what tools you’ve used to breach networks.

Tailor Your Application: Don’t just send a generic application! Tailor it to the role by mentioning specific experiences that relate to external network penetration testing and vulnerability management. This shows us you’re genuinely interested in the position.

Be Clear and Concise: We appreciate clarity! Make sure your application is well-structured and easy to read. Use bullet points for key achievements and keep your language straightforward—this helps us understand your experience quickly.

Apply Through Our Website: Finally, don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it makes the whole process smoother for everyone involved.

How to prepare for a job interview at Divvy Cloud Corp.

✨Know Your Stuff

Make sure you brush up on your technical skills and knowledge of penetration testing. Familiarise yourself with the latest vulnerabilities, attack vectors, and tools used in the industry. Being able to discuss recent trends or specific cases will show that you're not just knowledgeable but also passionate about the field.

✨Showcase Your Experience

Prepare to share specific examples from your past roles where you've successfully identified vulnerabilities or conducted penetration tests. Use the STAR method (Situation, Task, Action, Result) to structure your answers, making it easy for the interviewer to see your impact and contributions.

✨Understand the Client's Needs

Research the company and its clients before the interview. Understand their business model and potential security challenges they might face. This will help you tailor your responses and demonstrate how your skills can directly benefit them, showing that you’re not just a techie but also a strategic thinker.

✨Be Ready to Collaborate

Since this role involves working closely with a team, be prepared to discuss your collaborative experiences. Share examples of how you've worked with others to achieve common goals, and highlight your communication skills. This will reassure the interviewers that you can fit into their team dynamic.

Penetration Tester, Vector Command, Vulnerability Management & External Network
Divvy Cloud Corp.

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>