National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Copy of Penetration Tester

Telefónica Tech (EN)
Belfast
3 months ago
Applications closed

Related Jobs

View all jobs

Senior Penetration Tester

Cyber Threat Intelligence/Threat Hunter Specialist - SC Cleared

Cloud Architect

Systems Engineer

Senior Software Engineer

Head of IT

Telefónica Tech is a leading provider of innovative tech services for the B2B market with a worldwide presence and strategic hubs in Spain, Brazil, UK and Germany. The company helps leading brands and organisations across the UK and Ireland unlock the power of integrated technology for all businesses, bringing together in one place a unique combination of the best people, with the best tech and the best platforms in a simplified manner, to make a real difference to every business, every day.

We have an end-to-end portfolio of market leading services and develop integrated technology solutions to accelerate tech adoption through its two core divisions of Tech Cyber security & Cloud and Tech Intelligence of Things. The company has a diverse, highly trained and globally located talent pool of over 2000 employees and serves more than 5.5m customers every day with a service reach in 175 countries. Its dynamic partner ecosystem includes over 300 cutting-edge businesses, as well as strategic agreements with all market leaders.

Job Description

This is a full-time role for a Penetration Tester to join a mature managed services Cyber team who manage the security posture of critical infrastructure and services under an ISO27001 and Cyber Essentials + certified managed service environment.

You will be responsible for conducting Adversary Emulation which includes penetration tests as well as red-teaming exercises for health care enterprises.

This is a technical, hands-on role, and the successful candidate will be responsible for showcasing how an adversary can take advantage of vulnerable systems in an organization to get initial access to enterprise assets and then move laterally to widen the impact. They will also be responsible for providing very specific guidance to mitigate these security gaps/mis-configs/vulnerabilities.

The successful candidate will be responsible for conducting Adversary Emulation on various enterprise environments including but not limited to On-prem Infrastructure, Cloud, Web Apps, Non-Web Apps, IoT, Mobile Apps and Devices, SCADA environments, etc.

Qualifications

Skills & Experience:

  • Extensive experience in conducting penetration tests for Applications, IT Infrastructure Services, Cloud, IoT, SCADA, Network devices, Mobile Platforms, Hardware appliances, etc.
  • Experience in planning and executing Whitebox, Blackbox, and Greybox penetration testing.
  • Experience in planning and executing red teaming exercises including general reconnaissance, social engineering, breach simulations, etc.
  • Experience in conducting automated as well as manual penetration tests.
  • Experience in conducting manual config reviews for Network devices, Servers, IoT devices, Applications, etc.
  • In-depth understanding of general security principles.
  • In-depth understanding of how security technologies like firewalls, EDR, SIEM, TVM operate in a coherent manner, and how to avoid unnecessary alerts while executing an Adversary Emulation exercise.
  • Excellent communication, reporting, and presentation skills.
  • Ability to plan, prioritize, be proactive and manage own workload.
  • Understanding of up-to-date security threats and common exploits.
  • Open attitude to sharing knowledge and information.
  • Excellent analytical and problem-solving skills.
  • Desire to learn new technologies.
  • Motivated attitude to learn and challenge comfort zone.
  • To keep up to date with the latest security and technology developments.
  • Cyber security certification (e.g. OSCP, CRTO, OSCE, OSWP, etc).
  • Scripting Experience.

Additional Information

  • Must have the right to live and work in the UK or Republic of Ireland.
  • Due to our location, access to own transport is essential.
  • Must meet Security Clearance requirements if this is a requirement of the role and any offer would be conditional upon the successful candidate passing BPSS which includes a criminal record check.
  • Role can be worked remotely from within the UK and Ireland but occasional travel to Dublin/Belfast will be required.

We don’t believe hiring is a tick box exercise, so if you feel that you don’t match the job description 100%, but would still be a great fit for the role, please get in touch.

#J-18808-Ljbffr

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.