JOB TODAY logo

Penetration Tester - Cyber Armed Security

Information Technology

24 September 2025110 views

Expires in 15 days

Cyber Armed Security are seeking a skilled Penetration Tester to join their Cyber Security team. In this role, you will be responsible for simulating real-world attacks against our clients’ systems, applications, and infrastructure to identify vulnerabilities and provide actionable remediation advice. You will play a critical role in strengthening security postures, protecting sensitive data, and helping organisations meet compliance and regulatory requirements, the candidate must be highly self-motivated and confident to work efficiently alone.


Key Responsibilities
· Conduct penetration testing across networks, web applications, APIs, mobile applications, and cloud environments.
· Perform vulnerability assessments and exploit weaknesses in a controlled, ethical manner.
· Develop and deliver detailed technical reports and clear executive summaries for clients.
· Provide expert advice on remediation strategies and security best practices.
· Stay up to date with the latest exploits, attack vectors, tools, and methodologies.
· Support Red Team and Purple Team engagements where required.
· Collaborate with internal security teams, developers, and client stakeholders to improve overall security posture.


Essential Skills & Experience
· Minimum of 2 years of proven experience as a Penetration Tester, Ethical Hacker, or in a similar cyber security role.
· Manual testing ability
· Strong knowledge of penetration testing methodologies (e.g. OWASP, NIST).
· Proficiency with common testing tools (e.g. Burp Suite, Metasploit, Nmap, Nessus, Kali Linux).
· Solid understanding of networks, operating systems, web technologies, and cloud platforms (AWS, Azure, GCP).
· Ability to write and deliver clear, professional reports.
· Relevant industry certifications (e.g. OSCP, CREST CRT, CEH, GIAC GPEN) highly desirable.


Desirable Skills
· Experience with scripting/programming languages (Python, PowerShell, Bash, etc.).
· Exposure to Red Team operations and threat emulation.
· Familiarity with security compliance standards (ISO 27001, PCI-DSS, Cyber Essentials Plus).
· Strong client-facing skills and ability to explain technical findings in non-technical terms.

  • Experience
    Required
  • Languages
    English – Advanced
  • Employment
    Full-time
  • Schedule
    Full Time - Remote
  • Salary
    £42,000 – £48,000 yearly

pin iconW1T, London

icon
Information TechnologyLondon

Trusted ethical hacking specialists of an elite class within our field. We know security inside out! • 1-10 Employees

Hiring on JOB TODAY since September, 2025

We only work within Ethical Hacking / Intelligence Services and only hire top talent or distinguished prodigies.

Company photo #1
Company photo #2
Samantha G. avatar icon
Samantha G.Active 1 month ago
Are you hiring?

Post a job and hire

Hire now

Similar jobs

  • Yagshree Consultancy Ltd
    Security Operations Analyst
    Security Operations Analyst
    4 days ago
    £36000–£49000 yearly
    Full-time
    London

    As a Security Operations Analyst. You’ll monitor, triage, and respond to threats across our global estate, using modern SIEM/EDR and automation to keep [Company/clients] safe. Hybrid working, strong learning culture, and clear progression. The role • You’ll be part of our Security Operations Centre, detecting and responding to cyber threats, improving our controls, and guiding the business through security incidents. This role suits someone hands-on with SOC tooling, calm under pressure, and eager to automate the boring stuff. What you’ll do • Monitor and triage security alerts across SIEM (e.g., Microsoft Sentinel/Splunk), EDR (e.g., Defender for Endpoint/CrowdStrike), email security, and cloud platforms., • Investigate incidents end-to-end: scoping, containment, eradication, and recovery; maintain clear incident records and timelines., • Execute and improve playbooks/runbooks; contribute to SOAR automation for repetitive tasks., • Perform threat hunting using hypotheses mapped to MITRE ATT&CK; enrich findings with threat intelligence (internal and external)., • Lead/assist on phishing investigations, malware analysis at triage level, and suspicious user activity reviews., • Collaborate with IT/Cloud/Network teams on log onboarding, tuning, and control gaps; reduce false positives., • Track and meet SLAs/KPIs (MTTD/MTTR); deliver concise, executive-ready post-incident reports and lessons learned., • Support vulnerability management by contextualising exposures and recommending remediation priorities., • Participate in shift handovers and, if applicable, an out-of-hours/on-call rota., • Contribute to security awareness and purple-team exercises/attack simulations. What you’ll bring • Experience in a SOC/IR role (typically 2–5 years for this level) with demonstrable incident handling., • Working knowledge of: SIEM, EDR, email security, network security (IDS/IPS, firewalls), and cloud security (Azure/AWS)., • Ability to query and analyse data (KQL/Splunk SPL/SQL); basic scripting (PowerShell or Python) for enrichment and automation., • Familiarity with frameworks and standards: MITRE ATT&CK, NIST CSF, ISO/IEC 27001, and Cyber Essentials/Plus., • Strong written and verbal communication; comfortable translating technical risk for non-technical audiences., • A proactive mindset: curiosity, ownership, and continuous improvement., • Nice to have (advantageous, not essential), • Certifications such as Security+, CySA+, SC-200, AZ-500, GCIH/GCIA/GCTI, SSCP, GCED, or equivalent., • Experience with SOAR tooling, sandboxing, DFIR basics, or purple-team methodology., • Exposure to identity security (Entra ID, Okta), SaaS security, or container/Kubernetes security., • Experience in regulated environments (financial services, public sector) and/or UK SC/BPSS clearance eligibility. What we offer • Leave: 20 days’ annual leave, • Pension & protection: Employer pension contribution, life assurance, and income protection., • Learning & growth: Budget for certifications, paid exam days, access to labs and training platforms; clear progression to Senior Analyst/Incident Responder/Threat Hunter.

    Easy apply