Penetration Tester

Greater Manchester Training Ltd
Manchester, United Kingdom
7 days ago

Role details

Contract type
Permanent contract
Employment type
Part-time / full-time
Working hours
Regular working hours
Languages
English
Compensation
£ 40K

Job location

Remote
Manchester, United Kingdom

Tech stack

API
Software System Penetration Testing
Bash
Burp Suite
C++
Ubuntu (Operating System)
Cloud Computing
Computer Programming
Linux
Python
Online Service Provider
Powershell
Web Applications
Scripting (Bash/Python/Go/Ruby)
Metasploit
User Accounts

Job description

We are seeking a highly skilled Penetration Tester with proven experience in red-team operations, advanced technical compromise, and deep knowledge of modern computing, mobile, and radio-frequency ecosystems. This is a project-to-project contract role, supporting clients who require realistic, technically sophisticated adversary-emulation engagements., * Perform authorised compromise testing against user accounts, cloud identities, email platforms, and online services within defined rules of engagement.

  • Conduct red-team operations including reconnaissance, initial access, lateral movement, privilege escalation, and data-access simulation.

  • Assess mobile device security, including architecture analysis, application behaviour, and payload deployment.

  • Execute network, cloud, web application, and API penetration tests.

  • Perform RF and SDR-based assessments, including analysis of wireless protocols and device communication security.

  • Develop, adapt, and deploy custom payloads, exploits, and tooling.

  • Produce clear, evidence-driven technical reports and executive summaries.

  • Present findings to technical and non-technical stakeholders.

  • Maintain up-to-date knowledge of attacker TTPs, emerging vulnerabilities, and offensive tooling.

  • Operate strictly within legal and ethical boundaries, following client-approved scope and engagement rules.

Requirements

Do you have experience in iOS?, The role involves conducting authorised attempts to compromise systems, accounts, devices, and infrastructure using whatever attack paths you determine to be most effective within the agreed scope. Engagements may include identity compromise, cloud intrusion, mobile-device exploitation, RF-based assessments, and full red-team operations. You will be expected to operate autonomously, think creatively, and demonstrate a high level of technical depth across multiple domains., * Demonstrated experience in red-team engagements or advanced offensive security roles.

  • Proven ability to compromise systems and identities using a wide range of technical attack paths.

  • Strong understanding of mobile device architecture, including iOS and Android internals.

  • Experience developing and deploying payloads across multiple platforms.

  • Proficiency with SDR, RF analysis, and wireless protocol assessment.

  • Deep knowledge of Linux, including Ubuntu-based environments, system internals, and toolchains.

  • Strong programming and scripting ability in languages such as Python, C/C++, PowerShell, Bash, or similar.

  • Familiarity with offensive frameworks such as Cobalt Strike, Metasploit, Burp Suite, BloodHound, Empire, or equivalents.

  • Excellent communication and reporting skills.

  • Relevant certifications (e.g., OSCP, OSEP, OSCE, CRTO, CREST CRT/CCSAS) are advantageous but not required if experience is demonstrably strong.

Engagement Model

  • Contract / Freelance, project-to-project.

  • Engagements range from short, targeted compromise tests to multi-week red-team operations.

  • Primarily remote, with occasional on-site work depending on project scope., A technically exceptional offensive security professional who can independently identify, design, and execute attack paths across diverse environments. You should be comfortable working with complex systems, emerging technologies, and unconventional vectors, while maintaining the discipline and clarity expected in client-facing consulting work.

Apply for this position