At a Glance
- Tasks: Conduct penetration tests and support red-team engagements while producing detailed reports.
- Company: Specialist cyber security consultancy known for high-impact testing and assessments.
- Benefits: Competitive salary, mentorship, funded training, and clear progression routes.
- Why this job: Accelerate your career in a dynamic environment with cutting-edge security challenges.
- Qualifications: First-Class Honours in Computer Science and hands-on experience in offensive security.
- Other info: Collaborative culture that encourages innovation and personal development.
The predicted salary is between 24000 - 48000 £ per year.
Opus is partnered with a specialist cyber security consultancy renowned for delivering high-impact penetration testing, red-team engagements, and advanced security assessments to clients across finance, government, defence, and enterprise sectors. Due to continued growth, they are seeking a Junior–Mid Level Penetration Tester with exceptional academic credentials and a strong technical foundation.
This role is ideal for someone who has already gained hands-on experience in offensive security—either commercially or through structured labs, CTFs, or research—and is ready to accelerate their career within a consultancy that invests heavily in technical development.
Key Responsibilities- Conduct penetration tests across web applications, APIs, mobile applications, cloud environments, and internal/external infrastructure.
- Support red-team and adversary simulation engagements under senior guidance.
- Produce clear, detailed, and actionable technical reports for clients.
- Present findings to both technical and non-technical stakeholders.
- Contribute to internal research, tooling, and methodology development.
- Stay current with emerging vulnerabilities, exploitation techniques, and security trends.
- Work collaboratively with senior testers and consultants to deliver high-quality engagements.
- Minimum Academic Requirement - First-Class Honours in Computer Science - This requirement is non-negotiable due to the technical depth and analytical rigour expected by the consultancy.
- Strong understanding of offensive security principles, vulnerabilities, and exploitation techniques.
- Experience with common tools such as Burp Suite, Nmap, Metasploit, Kali Linux, and associated frameworks.
- Knowledge of web technologies (HTTP, REST, authentication flows, common web vulnerabilities).
- Familiarity with OWASP Top 10, MITRE ATT&CK, and secure coding concepts.
- Ability to analyse and break down complex technical systems.
- Strong written communication skills, particularly in producing structured technical reports.
- Demonstrable passion for cyber security—e.g., CTFs, Hack The Box, TryHackMe, personal research, GitHub projects.
- Industry certifications (e.g., OSCP, OSWE, CRT, eJPT, eCPPT).
- Exposure to cloud security testing (Azure, AWS, GCP).
- Scripting or programming experience (Python, Bash, PowerShell, JavaScript, etc.).
- Experience in mobile application testing (iOS/Android).
- Understanding of Active Directory attack paths and privilege escalation.
- Mentorship from highly experienced penetration testers and red-team operators.
- Funded training, certifications, and structured development pathways.
- Exposure to diverse, challenging client environments.
- A collaborative, research-driven culture that encourages innovation.
- Clear progression routes from junior to senior consultant.
Penetration Tester employer: Opus Recruitment Solutions
Contact Detail:
Opus Recruitment Solutions Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Penetration Tester
✨Network Like a Pro
Get out there and connect with folks in the cyber security scene! Attend meetups, webinars, or conferences. We can’t stress enough how important it is to build relationships; you never know who might have the inside scoop on job openings.
✨Show Off Your Skills
Create a portfolio showcasing your penetration testing projects, CTF achievements, or any personal research. We want to see what you can do! Share it on platforms like GitHub and make sure to highlight your hands-on experience.
✨Ace the Interview
Prepare for technical interviews by brushing up on your offensive security knowledge and tools like Burp Suite and Metasploit. We recommend doing mock interviews with friends or using online platforms to get comfortable with the format.
✨Apply Through Us!
Don’t forget to apply through our website! We’re always on the lookout for passionate individuals ready to dive into the world of penetration testing. It’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace Penetration Tester
Some tips for your application 🫡
Show Off Your Skills: Make sure to highlight your technical skills and any hands-on experience you've got in offensive security. Whether it's through CTFs, labs, or personal projects, we want to see what you've done!
Tailor Your Application: Don’t just send a generic CV and cover letter. Tailor them to the role! Mention specific tools and techniques you’re familiar with, like Burp Suite or OWASP Top 10, to show us you’re the right fit.
Be Clear and Concise: When writing your application, clarity is key. We love structured technical reports, so make sure your writing is easy to follow and gets straight to the point. Show us you can communicate effectively!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates from us!
How to prepare for a job interview at Opus Recruitment Solutions
✨Know Your Tools Inside Out
Make sure you’re familiar with the common tools mentioned in the job description, like Burp Suite and Metasploit. Practise using them in real scenarios or labs so you can confidently discuss your experience during the interview.
✨Showcase Your Passion
Bring up any personal projects, CTFs, or research you've done in cyber security. This not only shows your enthusiasm but also demonstrates your commitment to staying current with industry trends and vulnerabilities.
✨Prepare for Technical Questions
Expect to be asked about offensive security principles and common vulnerabilities. Brush up on the OWASP Top 10 and MITRE ATT&CK frameworks, and be ready to explain how you would approach a penetration test.
✨Practice Your Reporting Skills
Since producing clear technical reports is key, practise summarising complex findings in a way that’s easy to understand. You might even want to prepare a mock report to showcase your written communication skills during the interview.