National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Offensive Security Specialist - Penetration Tester

GCS
London
3 weeks ago
Applications closed

Related Jobs

View all jobs

Penetration Tester

DevSecOps Engineer - ONSITE

Senior Cyber Security Architect

Security and Information Security Architect

(Solana) Offensive Security Engineer - 100% Remote, Blockchain, DeFi

CYBER SECURITY INFRASTRUCTURE ENGINEER- AEROSPACE AND DEFENSE.

Role Summary:
Join our dynamic Offensive Security Team! As we expand, we are looking for a Pentester/Red Teamer who is enthusiastic about undertaking a range of security assessments, including penetration testing, red team exercises, vulnerability scanning, and physical access evaluations for our clients.
Key Responsibilities:
Client Engagement Management: Lead client projects, ensuring clear communication, timely delivery, and exceeding expectations. Act as the primary liaison, providing updates and guidance.
Security Assessment Execution: Conduct detailed security assessments, including penetration testing and vulnerability analysis. Systematically identify and document vulnerabilities across network, application, and physical layers. Prepare concise reports for both technical and non–technical stakeholders.
Red Team Challenges: Participate in red team simulations, encompassing social engineering attacks and advanced penetration tactics. Post–initial access, perform internal testing to escalate privileges and gain high–level access. Document methodologies and outcomes, providing actionable insights for enhancing security.
Technical Proficiencies:
Python/Scripting: Demonstrate a high level of proficiency in Python, essential for writing custom scripts to automate tasks, analyze data, and develop unique tools for penetration testing. This skill is crucial for tailoring attacks, parsing data, and creating efficient workflows in security assessments.
Linux/Windows Proficiency: Have a thorough understanding of Linux/Windows systems, which are commonly used in security environments. This includes navigating the command line, understanding file permissions, managing services, and using Linux/Windows–based security tools. Knowledge of Linux/Windows is vital for testing and exploiting Unix/Windows–based applications and servers.
Burp Suite Expertise: Exhibit expertise in using Burp Suite, a leading tool for web application security testing. This includes leveraging its various features for intercepting traffic, conducting automated scans, manipulating requests and responses, and identifying vulnerabilities in web applications.
Nmap and Enumeration Tools: Skilled in using Nmap for network scanning and enumeration. This involves not just running scans but interpreting results to identify open ports, services, and potential vulnerabilities. Familiarity with other enumeration tools that help in discovering and mapping network and system details is also important.
Active Directory Analysis/Impacket: Proficient in analyzing Active Directory environments using tools like Impacket. This includes understanding AD architecture, identifying misconfigurations, and exploiting them. Skills in leveraging Impacket for tasks like network relays, password spraying, and gaining elevated privileges are crucial for penetrating Windows environments.
We're Seeking:
Qualifications: A degree in Computer Science, Engineering, Mathematics, or Physics.
Experience Level: Open to graduates/juniors and above. The more experience in red teaming, the better.
Skills: Exceptional problem–solving abilities, with a flair for thinking on your feet and tackling constantly evolving threats creatively.
Attributes: Motivated, passionate, determined, and an avid learner. We value self–starters with proven experience who are driven to learn.
Communication: Strong interpersonal and communication skills are essential for effective team collaboration, which is a key aspect of our work culture
GCS is acting as an Employment Agency in relation to this vacancy.

#J-18808-Ljbffr

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs Skills Radar 2026: Emerging Frameworks, Tools & Certifications to Learn Now

Cyber threats are evolving—and so must the people defending against them. As ransomware, AI-enhanced phishing, and supply chain attacks grow more advanced, UK employers are urgently hiring cyber security professionals with the right mix of strategic and hands-on skills. Welcome to the Cyber Security Jobs Skills Radar 2026, your go-to guide for the most in-demand tools, frameworks, certifications, and technologies shaping the UK's cyber workforce. Whether you're a SOC analyst, penetration tester, or cloud security architect, this annual radar is designed to help you stay ahead of the market.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.