At a Glance
- Tasks: Conduct penetration tests to identify and fix security vulnerabilities in applications and infrastructure.
- Company: Join ExpressVPN, a leader in online privacy and security services.
- Benefits: Collaborative culture, career growth opportunities, and a focus on learning.
- Why this job: Make a real impact on internet security for millions while working with cutting-edge technology.
- Qualifications: Experience in application security, vulnerability assessment, and mentoring junior team members.
- Other info: Dynamic environment with a strong emphasis on teamwork and innovation.
The predicted salary is between 36000 - 60000 £ per year.
If you’re passionate about security and privacy, and want to use your offensive security skills to help safeguard private, uncensored access to the internet for millions of customers, we’d love to speak with you.
Who you are
You’re a natural at solving problems and identifying security weaknesses with deep expertise in application security and infrastructure, and you have experience working on teams that know how to remediate vulnerabilities you identified based on your recommendations. You aren’t afraid of change, and you ask the questions that need to be asked. A lack of clarity is something you can’t settle for, and you voice your concerns when the balance between effort and impact seems off.
As someone with an offensive security mindset, you know there are always vulnerabilities waiting to be found, and you’re naturally collaborative to help find and address them. You’re always willing to hear ideas from your colleagues. Likewise, you’re willing to share your own knowledge and mentor others.
What you’ll do
- Prepare and execute penetration testing projects of our assets, services and applications, either individually or as part of a team with members across various geographic locations such as Singapore, Hong Kong, London, Germany and Bucharest.
- Operate across a wide range of technologies, from client facing applications written in various languages for various platforms, to backend infrastructure and services, and router firmware.
- Provide an environment where you’ll be exposed to a wide range of technologies that form our tech stack.
- Utilise a strong white-box testing methodology and the ability to identify bugs in source code, along with good organization and communication skills when delivering penetration tests of our applications and services.
- Work closely with the engineering teams to provide expert guidance and advice on remediation of identified vulnerabilities.
- Verify the existence of newly discovered vulnerabilities in our software stack, including triaging and verifying bugs from our bug bounty program and automated scanners, and develop novel attack vectors based on these.
- Manage and support penetration testing services performed by outside vendors, from project inception, scoping, completion of the assessment, and finally, working with engineering teams to have the identified issues remediated.
- Bring creative solutions to fruition for solving some of the complex security challenges faced by our organization, and provide security reviews on technical design documents for our solutions.
- Identify areas where automated testing can be done, then develop, maintain and continuously improve tools to support these automated tests.
- Mentor, guide and support other team members using your strong technical knowledge.
- Identify inefficiencies in the team’s workflow, suggest solutions and drive them to completion.
This role focuses strongly on your ability to perform penetration testing (with a specialization in either desktop and server applications, infrastructure, and mobile apps, depending on your experience). To be a good fit for this role, you should be able to read source code in various languages, identify security weaknesses and vulnerabilities in various platforms and efficiently deliver security assessment projects while mentoring junior team members. Networking knowledge is critical to succeed in this role.
What you’ll bring
- Identify vulnerabilities, misconfigurations and deviations from best practices within applications by means of manual source code review, static code analysis, and/or fuzzing using Burp Suite, AFL or similar tooling. We expect vulnerabilities to be identified and exploited up to the levels of OSCP, OSWE or OSED.
- Analyze application binaries, shared libraries, and browser extensions through the use of debuggers and reverse engineering tools to understand the components of the application and assess their security posture, as well as how they interact with the underlying operating system.
- Experience writing scripts in languages such as: Python, bash, or Golang to showcase your proof of concepts.
- Experience writing automation workflows such as Github Actions.
- Provide mentorship and guidance to other team members and share knowledge and findings with them.
- Good knowledge of TCP/IP, IDS/IPS, firewalls, WAF, and web content filtering.
- Cryptography: PGP, SSH, PKI.
How you’ll succeed
- Your capacity to consistently identify security vulnerabilities and provide sound remediation strategies alongside our engineering teams is key to success in this role.
- You’ll be assigned as a security lead across a number of our projects, and will need to mentor more junior team members and help them grow their skillset.
- Your ability to design technical solutions while staying ahead of industry trends will help drive continued security improvement, especially when supporting secure engineering designs.
- Finally, candidates with strong experience in manual source code review and vulnerability research, or a strong track record in this area (e.g. CTFs, bug bounty program activity, published CVEs) are preferred.
How we’ll support you
- We prioritize treating every team member with respect and promote open and constructive feedback, ensuring a culture of trust and transparency.
- We encourage learning through experimentation and provide a safe space for everyone to learn from their experiences.
- Our managers are dedicated to facilitating career growth and creating an environment that attracts and supports talented engineers.
Before you apply
At the moment, we do not sponsor visas in the EU. For Hong Kong, we require at least two years of working experience and a university degree in a related field. For Singapore and the UK, we can only sponsor visas for mid-career or above.
Please upload your resume as a PDF and do not include any salary or compensation information in it.
ExpressVPN is one of the world’s leading providers of online privacy and security services for consumers. Started in 2009, we’ve grown to have millions of active paying customers, a team of more than 700 people worldwide, and a brand recognized by hundreds of millions of people in 18 languages and more than a hundred countries. We see huge growth in our industry, and are gaining market share through strong execution.
Senior Penetration Tester in London employer: ExpressVPN
Contact Detail:
ExpressVPN Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Penetration Tester in London
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your penetration testing projects, including any bug bounties you've tackled. This gives potential employers a taste of what you can do and sets you apart from the crowd.
✨Tip Number 3
Prepare for interviews by brushing up on common penetration testing scenarios and methodologies. Practice explaining your thought process when identifying vulnerabilities, as this will demonstrate your expertise and problem-solving skills.
✨Tip Number 4
Don't forget to apply through our website! We love seeing candidates who are genuinely interested in joining our team. Plus, it makes it easier for us to keep track of your application and get back to you quickly.
We think you need these skills to ace Senior Penetration Tester in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior Penetration Tester role. Highlight your experience in application security, vulnerability identification, and any relevant projects you've worked on. We want to see how your skills align with what we're looking for!
Show Off Your Skills: In your written application, don’t hold back on showcasing your technical skills. Mention specific tools and methodologies you’ve used, like Burp Suite or static code analysis. We love seeing candidates who can demonstrate their expertise clearly!
Be Clear and Concise: When writing your application, clarity is key! Avoid jargon and keep your language straightforward. We appreciate a well-structured application that gets straight to the point, making it easy for us to see your qualifications.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re keen on joining our team!
How to prepare for a job interview at ExpressVPN
✨Know Your Stuff
Make sure you brush up on your technical skills, especially in application security and infrastructure. Be ready to discuss specific vulnerabilities you've identified in the past and how you remediated them. This shows you're not just knowledgeable but also practical.
✨Show Off Your Collaboration Skills
Since this role involves working closely with engineering teams, be prepared to share examples of how you've collaborated in the past. Highlight any mentoring experiences you have, as well as how you’ve contributed to team success by sharing knowledge and ideas.
✨Ask the Right Questions
Demonstrate your curiosity and problem-solving mindset by asking insightful questions during the interview. Inquire about the company's current security challenges or their approach to vulnerability management. This shows you're engaged and genuinely interested in the role.
✨Prepare for Real-World Scenarios
Expect to tackle some practical scenarios or case studies during the interview. Brush up on your penetration testing methodologies and be ready to discuss how you would approach identifying and exploiting vulnerabilities in various applications or systems.