At a Glance
- Tasks: Conduct penetration tests and support red-team engagements while producing detailed reports.
- Company: Specialist cyber security consultancy known for high-impact testing and assessments.
- Benefits: Competitive salary, mentorship, funded training, and clear progression routes.
- Why this job: Accelerate your career in a dynamic environment with cutting-edge security challenges.
- Qualifications: First-Class Honours in Computer Science and hands-on experience in offensive security.
- Other info: Collaborative culture that encourages innovation and personal development.
The predicted salary is between 24000 - 48000 £ per year.
Opus is partnered with a specialist cyber security consultancy renowned for delivering high-impact penetration testing, red-team engagements, and advanced security assessments to clients across finance, government, defence, and enterprise sectors. Due to continued growth, they are seeking a Junior–Mid Level Penetration Tester with exceptional academic credentials and a strong technical foundation.
This role is ideal for someone who has already gained hands-on experience in offensive security—either commercially or through structured labs, CTFs, or research—and is ready to accelerate their career within a consultancy that invests heavily in technical development.
Key Responsibilities- Conduct penetration tests across web applications, APIs, mobile applications, cloud environments, and internal/external infrastructure.
- Support red-team and adversary simulation engagements under senior guidance.
- Produce clear, detailed, and actionable technical reports for clients.
- Present findings to both technical and non-technical stakeholders.
- Contribute to internal research, tooling, and methodology development.
- Stay current with emerging vulnerabilities, exploitation techniques, and security trends.
- Work collaboratively with senior testers and consultants to deliver high-quality engagements.
- Minimum Academic Requirement - First-Class Honours in Computer Science - This requirement is non-negotiable due to the technical depth and analytical rigour expected by the consultancy.
- Strong understanding of offensive security principles, vulnerabilities, and exploitation techniques.
- Experience with common tools such as Burp Suite, Nmap, Metasploit, Kali Linux, and associated frameworks.
- Knowledge of web technologies (HTTP, REST, authentication flows, common web vulnerabilities).
- Familiarity with OWASP Top 10, MITRE ATT&CK, and secure coding concepts.
- Ability to analyse and break down complex technical systems.
- Strong written communication skills, particularly in producing structured technical reports.
- Demonstrable passion for cyber security—e.g., CTFs, Hack The Box, TryHackMe, personal research, GitHub projects.
- Industry certifications (e.g., OSCP, OSWE, CRT, eJPT, eCPPT).
- Exposure to cloud security testing (Azure, AWS, GCP).
- Scripting or programming experience (Python, Bash, PowerShell, JavaScript, etc.).
- Experience in mobile application testing (iOS/Android).
- Understanding of Active Directory attack paths and privilege escalation.
- Mentorship from highly experienced penetration testers and red-team operators.
- Funded training, certifications, and structured development pathways.
- Exposure to diverse, challenging client environments.
- A collaborative, research-driven culture that encourages innovation.
- Clear progression routes from junior to senior consultant.
Penetration Tester employer: Opus Recruitment Solutions
Contact Detail:
Opus Recruitment Solutions Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Penetration Tester
✨Tip Number 1
Network like a pro! Get involved in cyber security meetups, online forums, and local events. The more people you know in the industry, the better your chances of landing that dream role.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your penetration testing projects, CTF achievements, or any relevant research. This will give potential employers a taste of what you can do.
✨Tip Number 3
Don’t just apply—engage! When you find a job listing that excites you, reach out to current employees on LinkedIn. Ask them about their experiences and get insider tips on the application process.
✨Tip Number 4
Keep learning and stay updated! Follow the latest trends in cyber security, and consider joining platforms like StudySmarter for resources and courses. It shows employers you're committed to your professional growth.
We think you need these skills to ace Penetration Tester
Some tips for your application 🫡
Show Off Your Skills: Make sure to highlight your technical skills and any hands-on experience you've got in offensive security. We want to see your passion for cyber security, so mention any CTFs or personal projects that showcase your abilities!
Tailor Your Application: Don’t just send a generic application! Take the time to tailor your CV and cover letter to match the job description. We love seeing how your experiences align with what we’re looking for in a Junior–Mid Level Penetration Tester.
Be Clear and Concise: When writing your application, keep it clear and to the point. We appreciate strong written communication skills, so make sure your reports and descriptions are structured and easy to understand. Show us you can communicate technical findings effectively!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates. Plus, it shows you’re keen to join our team!
How to prepare for a job interview at Opus Recruitment Solutions
✨Know Your Tools Inside Out
Make sure you’re familiar with the common tools mentioned in the job description, like Burp Suite and Metasploit. Practise using them in real scenarios or labs so you can confidently discuss your experience during the interview.
✨Showcase Your Passion
Bring up any personal projects, CTFs, or research you've done in cyber security. This not only shows your enthusiasm but also demonstrates your commitment to staying current with industry trends and techniques.
✨Prepare for Technical Questions
Expect to be asked about offensive security principles and vulnerabilities. Brush up on the OWASP Top 10 and MITRE ATT&CK frameworks, and be ready to explain how you would approach a penetration test or tackle a specific vulnerability.
✨Practice Your Reporting Skills
Since producing clear technical reports is key, practise summarising complex findings in a way that’s easy to understand. You might even want to prepare a mock report based on a previous project to showcase your written communication skills.