At a Glance
- Tasks: Work with AI to ethically test applications and identify real vulnerabilities.
- Company: Join NoScope, a cutting-edge venture backed by TryHackMe.
- Benefits: Enjoy a competitive salary and fully remote work with a global team.
- Other info: Fast-paced environment with high trust and autonomy from day one.
- Why this job: Be at the forefront of AI in cybersecurity and make a real impact.
- Qualifications: 3-5 years in offensive security and strong coding skills in Python, Bash, and JavaScript.
The predicted salary is between 60000 - 80000 £ per year.
About NoScope
NoScope is a new venture from the team behind TryHackMe, the world’s largest cyber security training platform used by 7M+ users and thousands of businesses. We’re building an AI-powered pentesting solution. Attackers are already using AI to launch hundreds of thousands of attacks in minutes, and traditional pentesting hasn’t kept up - it’s still manual, expensive, and time-limited, meaning large parts of applications go untested and real vulnerabilities slip through. NoScope solves this with a swarm of AI agents that ethically test applications, chaining actions across pages and workflows to find and validate real vulnerabilities with clear evidence. We’ve already identified critical vulnerabilities in large-scale platforms, widely used open source systems, and applications that had decades of traditional pentests from top firms. With TryHackMe’s backing, deep offensive security expertise, and access to large-scale training environments, we’re building a fundamentally better solution for pentesting.
The Role
You will work closely with the core agentic system and help shape how it performs in real environments. This role requires thinking like an attacker, challenging assumptions, and ensuring that what we identify is genuinely exploitable and meaningful. You will be involved in hands‑on testing, improving how the system approaches testing, and maintaining a high bar for the quality of findings. This role also has a focus on content creation, including clear and detailed blogs, technical writeups, and breakdowns of vulnerabilities discovered by the agent. The emphasis is on explaining real‑world impact, how issues could be exploited, and how they should be fixed, helping build credibility and share useful insights with the broader security community.
What you’ll do
- Work directly with the AI agent system, run it against targets, understand where it performs well and where it falls short, and provide structured feedback to improve coverage and accuracy.
- Validate, reproduce, and elevate findings, writing clear and reliable proof‑of‑concepts that demonstrate real‑world exploitability.
- Coordinate disclosures across OSS projects and bug bounty platforms, managing timelines and communication effectively.
- Contribute to public security research and technical content that is relevant and valuable to the security community.
- Research emerging vulnerability classes and attack techniques, and translate those insights into improvements in how the system tests.
- Build and maintain custom tooling where needed, including automation scripts, payload lists, and testing harnesses tailored to specific targets.
What we’re looking for
- 3-5+ years of professional offensive security experience in penetration testing, bug bounty, or red teaming.
- Strong understanding of web application vulnerabilities such as SQLi, XSS, SSRF, IDOR, SSTI, business logic flaws, authentication bypasses, and their real‑world nuances.
- Comfortable reading and writing code in Python, Bash, and JavaScript, with the ability to build custom tooling when needed.
- Experience with public disclosures or CVEs.
- Clear and effective written communication, with the ability to explain complex findings to both engineers and security teams.
- Experience working with bug bounty platforms and responsible disclosure processes.
- Ability to go beyond automated tools and reason about systems, attack paths, and edge cases.
Bonus points
- Public bug bounty reports or an active HackerOne or Bugcrowd profile.
- Experience with TryHackMe or familiarity with its community.
- Exposure to AI‑assisted security tooling.
Why NoScope
- AI is fundamentally changing how the world finds and fixes vulnerabilities - you’ll be working on systems that represent where the field is going, not where it is today.
- Backed by TryHackMe, with funding, distribution, and full support from founders who built a $30M+ ARR cybersecurity company.
- Access to a 7M+ user network and real‑world environments that help validate findings at scale.
- Be an early hire with real ownership over testing quality, exploitability standards, and how results are validated.
- Work with a strong, focused team building at the intersection of AI and offensive security.
- Competitive salary.
- Fully remote - work from anywhere with a global team.
- High trust and autonomy from day one.
Please note that we are currently unable to provide sponsorship.
How we work
We operate with intensity. You’ll move fast, wear multiple hats, and get involved in things outside your job title. There’s no playbook, no hand‑holding, and no coasting. If you’re looking for a standard 9-5 with clear lanes, this isn’t the right fit. If you want an environment built to win where your work genuinely matters, you’ll thrive here.
Offensive Security Engineer · employer: TryHackMe Ltd
Contact Detail:
TryHackMe Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Offensive Security Engineer ·
✨Tip Number 1
Network like a pro! Get involved in online communities, attend meetups, and connect with folks in the offensive security space. You never know who might have a lead on your dream job!
✨Tip Number 2
Show off your skills! Create a portfolio of your work, including any public bug bounty reports or write-ups. This not only demonstrates your expertise but also gives potential employers a taste of what you can do.
✨Tip Number 3
Don’t just apply – engage! When you find a role that excites you, reach out to current employees on LinkedIn. Ask them about their experiences and share your enthusiasm for the position. It’s a great way to stand out!
✨Tip Number 4
Keep learning and sharing! Stay updated on the latest trends in offensive security and contribute to discussions in forums or blogs. This shows your passion and commitment to the field, making you a more attractive candidate.
We think you need these skills to ace Offensive Security Engineer ·
Some tips for your application 🫡
Show Off Your Skills: When you're writing your application, make sure to highlight your offensive security experience. We want to see how you've tackled real-world vulnerabilities and what tools you've used. Don't hold back on showcasing your coding skills in Python, Bash, or JavaScript!
Be Clear and Concise: We love clear communication! When you describe your past projects or findings, keep it straightforward. Use simple language to explain complex concepts, as if you're talking to someone who's not a security expert. This will show us you can bridge the gap between technical details and broader implications.
Tailor Your Application: Make your application stand out by tailoring it to NoScope's mission. Mention how you can contribute to our AI-powered pentesting solution and why you're excited about working at the intersection of AI and offensive security. Show us that you understand our goals and how you fit into them!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss any important updates. Plus, it shows us you're keen on joining our team right from the start!
How to prepare for a job interview at TryHackMe Ltd
✨Know Your Vulnerabilities
Make sure you brush up on your knowledge of web application vulnerabilities like SQLi, XSS, and SSRF. Be ready to discuss real-world examples and how they can be exploited. This will show that you not only understand the theory but also the practical implications.
✨Show Off Your Coding Skills
Since coding is a big part of this role, practice writing code in Python, Bash, and JavaScript. Prepare to demonstrate your ability to build custom tooling or scripts during the interview. This will highlight your hands-on experience and problem-solving skills.
✨Communicate Clearly
You’ll need to explain complex findings to both engineers and security teams, so practice articulating your thoughts clearly. Consider preparing a few technical write-ups or blog posts to showcase your ability to communicate effectively about vulnerabilities and their impacts.
✨Research NoScope and AI in Security
Familiarise yourself with NoScope’s mission and how AI is changing the landscape of pentesting. Being able to discuss how you see AI impacting offensive security will demonstrate your enthusiasm for the role and your alignment with the company’s vision.