Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
🤖 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

Work Life Group NL • Warszawa, Pomeranian Voivodeship, Poland
Role & seniority
Stack/tools
Web, infrastructure and application penetration testing tools
Operating systems: UNIX and Windows administration
Scripting: Python, Go, PowerShell, or Bash/ksh/csh
Methodologies and reporting tools; familiarity with risk assessment methodologies
Knowledge of security products/technologies, cryptography, authentication, malware techniques
Top 3 responsibilities
Conduct tailored penetration testing across web, infrastructure, and applications (COTS and NOTS/GOTS) per documented methodologies
Write clear technical reports (executive summaries and remediation plans) and briefing security findings to technical and executive audiences
Perform security design reviews to ensure NATO policy/directive compliance; coordinate vulnerability follow-up with vendors and stakeholders
Must-have skills
BSc in a technical IT-related field; minimum 3 years in web/app and infrastructure penetration testing
Strong knowledge of network security architecture, OS/software/protocol vulnerabilities, and security product evaluation
Proficient in scripting (at least one of Python, Go, PowerShell, Bash) and in delivering risk assessments and mitigation plans
Fluent English (verbal and written); proven briefing ability at executive level
Experience with standard testing methodologies and reporting templates
Nice-to-haves
Would you like to join the leading international intergovernmental organization?
The NCIA NATO Cyber Security Centre (NCSC) is responsible for planning and executing all lifecycle management activities for cybersecurity. In executing this responsibility, NCSC provides specialist cyber security-related services covering the spectrum of scientific, technical, acquisition, operations, maintenance, and sustainment support, throughout the lifecycle of NATO Information Communications and Technology (ICT). Within the NCSC, the Penetration Testing Section plays a critical offensive security role. They conduct tailored vulnerability assessments, penetration testing, and red teaming activities against NATO networks throughout their entire lifecycle.
Providing Web, infrastructure and application level penetration testing, including but not limited to COTS software and NOTS/GOTS software (NATO/Government off the Shelf), following clearly defined methodologies. Participating in kick-off meetings with stakeholders and technical points of contact in order to identify requirements for testing. Following the documented procedures and workflows outlined by the technical leads. Attending team meetings if required. Writing technical reports in fluent English, following defined templates and Reporting Tools. Briefing, at both executive and technical levels, on security reports and testing outcome, including at flag officer level. In case of new vulnerabilities detected for COTS software, following the Responsible Disclosure Process and following-up with vendors and stakeholders. Providing security design reviews to ensure compliance with NATO policies and directives. In co-ordination with the Technical Lead of the Penetration testing team, ensuring proactive collaboration and coordination with internal and external stakeholders. Staying abreast of technological developments relevant to the area of work. Performing any other duties as may be required.
Bachelor of Science (BSc) degree at a nationally recognised/certified university in a technical subject with substantial Information Technology (IT) content and 3 years post-related experience.
Scripting skills in at least one of the following: Python, Go, PowerShell, shell (bash, ksh, csh) Technical knowledge in system and network security, authentication and security protocols, cryptography, application security, as well as, malware infection techniques and protection technologies. Ability to evaluate risks and formulate mitigation plans. Proven ability to brief at executive level on security findings, reports and testing outcome. Proven ability to write clear and structured technical reports, including executive summary, technical findings and remediation plan for several different audiences. Fluent English skills (verbal and written).
Professional qualifications: OSCP, OSCE, OSWE, GPEN, CREST Certified Web Application Tester, GXPN, GWAPT or equivalent Familiarity with risk analysis methodologies. Prior experience of working in an international environment comprising both military and civilian elements. Knowledge of NATO organization, internal structure and resultant relationships. If you've read the description and feel this role is a great match, we'd love to hear from you! Click "Apply for this job" to be directed to a brief questionnaire. It should only take a few moments to complete, and we'll be in touch promptly if your experience aligns with our needs. Show more Show less