Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
π€ 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

BrainRocket β’ New Jersey, United States
Role & seniority: Penetration Testing Team Lead; hands-on leadership (70β80% active) responsible for building and growing the Offensive Security function.
Stack/tools: Penetration testing across web/mobile/API/cloud (AWS, Azure, GCP); security tooling (Burp Suite Pro, Metasploit, Nmap); automation (Python, Go, PowerShell, Bash); cloud-native tech (Docker, Kubernetes); networking/OS (Linux, Windows); threat intel, SIEM/EDR tuning, purple team collaboration.
Establish and lead the offensive security function end-to-end (methods, reporting, hiring plan).
Recruit, mentor, and develop offensive security engineers; perform deep-dive manual pentests on high-risk assets.
Lead purple team exercises with SOC, coordinate with Application Security, translate findings into actionable threat intel and remediation guidance, and support security architecture reviews.
5+ years hands-on pentesting (web, mobile, API, cloud).
Experience building offensive security processes/tools from scratch.
Strong hands-on focus (70β80%) and leadership/coaching mindset.
Deep knowledge of pentesting methodologies (OWASP Top 10, SANS Top 25).
Experience with purple team exercises and improving detection with SOC.
Proficiency with Burp Suite Pro, Metasploit, Nmap; automation development (Python/Go/PowerShell/Bash).
Networking/OS knowledge (TCP/IP, HTTP/S, DNS; Linux/Windows); cloud-native (Docker/Kubernetes).
Clea
BrainRocket is a global company creating end-to-end tech products for clients across Fintech, iGaming, and Marketing. Young, ambitious, and unstoppable, we've already taken Cyprus, Malta, Portugal, Poland, and Serbia by storm. Our BRO team consists of 1,300 bright minds creating innovative ideas and products. We donβt follow formats. We shape them. We build what works, launch it fast, and make sure it hits.
We invite a Penetration Testing Team Lead to join our team. Core Mission To lead and grow the Offensive Security function while maintaining a strong hands-on role. Leverage an attacker mindset to identify critical business logic vulnerabilities and attack paths (kill chains), drive collaboration with Application Security and Security Operations teams, and lead purple team activities.
βοΈ Build the Offensive security function from the ground up: define methodologies, reporting standards, and the hiring plan for future team expansion. βοΈ Recruit, mentor, and develop the team of offensive security engineers, ensuring technical excellence and consistent delivery quality once hired. βοΈ Perform deep-dive manual penetration testing for complex, high-risk, or business-critical assets, focusing on realistic attack scenarios rather than high-volume "bug-bounty style" findings. βοΈ Lead and coordinate purple team exercises with the SOC/Blue Team, simulating real-world attacks to validate detection capabilities and tune SIEM/EDR rules. βοΈ Collaborate closely with the Application Security Team to validate vulnerabilities and guide effective remediation strategies. βοΈ Translate offensive findings into actionable threat intelligence, TTPs, and recommendations to enhance detection and threat hunting. βοΈ Act as a subject matter expert in security architecture discussions, secure design reviews, and security code reviews. βοΈ Stay current with emerging attack techniques, tools, and security trends, and ensure knowledge is shared within the engineering teams.
βοΈ Strong "playing coach" mindset: willingness to remain highly hands-on (70-80%) while setting up the function. βοΈ Deep understanding of penetration testing methodologies and frameworks (OWASP Top 10, SANS Top 25). βοΈ Demonstrated experience contributing to purple team exercises and working closely with SOC to improve detection logic. βοΈ Strong hands-on experience with industry-standard tools (Burp Suite Pro, Metasploit, Nmap, etc.) and ability to develop custom automation (Python, Go, PowerShell, Bash). βοΈ Solid knowledge of network protocols (TCP/IP, HTTP/S, DNS), operating systems (Linux, Windows), and cloud-native architectures (Docker, Kubernetes). βοΈ Excellent communication skills, with the ability to clearly present critical business risks to both technical and non-technical stakeholders.
Bold moves start here. Make yours. Apply today!