Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
π€ 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

BrainRocket β’ Lisbon, Portugal
Salary: 24 non-business days per year
Role & seniority: Penetration Testing Team Lead (senior/lead, hands-on with leadership duties)
Stack/tools: Offensive security tooling (Burp Suite Pro, Metasploit, Nmap, etc.); scripting (Python, Go, PowerShell, Bash); cloud environments (AWS, Azure, GCP); OS/Linux/Windows; container tech (Docker, Kubernetes)
Build and scale the Offensive Security function from scratch (methodologies, reporting standards, hiring plan)
Recruit, mentor, and develop offensive security engineers; own end-to-end pentest delivery and quality
Lead hands-on testing and purple team exercises with SOC/Blue Team; collaborate with Application Security; translate findings into threat intel and remediation guidance
5+ years hands-on penetration testing across web, mobile, API, and cloud (AWS/Azure/GCP)
Experience establishing offensive security processes/tools from scratch
Hands-on leadership mindset (70β80% hands-on while building the function)
Strong knowledge of pentesting methodologies (OWASP Top 10, SANS Top 25)
Experience with purple team activities and improving detection with SOC
Proficiency with standard tools and custom automation (Python/Go/PowerShell/Bash)
Solid understanding of networks, OSes, and cloud-native architectures (TCP/IP, HTTP/S, DNS; Linux/Windows; Docker/Kubernetes)
Excellent communication for technical and non-technical stakeholders
BrainRocket is a global company creating end-to-end tech products for clients across Fintech, iGaming, and Marketing. βYoung, ambitious, and unstoppable, we've already taken Cyprus, Malta, Portugal, Poland, and Serbia by storm. Our BRO team consists of 1,300 bright minds creating innovative ideas and products. We donβt follow formats. We shape them. We build what works, launch it fast, and make sure it hits. We invite a Penetration Testing Team Lead to join our team. It's an office-based role. Core Mission To lead and grow the Offensive Security function while maintaining a strong hands-on role. Leverage an attacker mindset to identify critical business logic vulnerabilities and attack paths (kill chains), drive collaboration with Application Security and Security Operations teams, and lead purple team activities.
βοΈ Build the Offensive security function from the ground up: define methodologies, reporting standards, and the hiring plan for future team expansion. βοΈ Recruit, mentor, and develop the team of offensive security engineers, ensuring technical excellence and consistent delivery quality once hired. βοΈ Perform deep-dive manual penetration testing for complex, high-risk, or business-critical assets, focusing on realistic attack scenarios rather than high-volume "bug-bounty style" findings. βοΈ Lead and coordinate purple team exercises with the SOC/Blue Team, simulating real-world attacks to validate detection capabilities and tune SIEM/EDR rules. βοΈ Collaborate closely with the Application Security Team to validate vulnerabilities and guide effective remediation strategies. βοΈ Translate offensive findings into actionable threat intelligence, TTPs, and recommendations to enhance detection and threat hunting. βοΈ Act as a subject matter expert in security architecture discussions, secure design reviews, and security code reviews. βοΈ Stay current with emerging attack techniques, tools, and security trends, and ensure knowledge is shared within the engineering teams.
βοΈ Strong "playing coach" mindset: willingness to remain highly hands-on (70-80%) while setting up the function. βοΈ Deep understanding of penetration testing methodologies and frameworks (OWASP Top 10, SANS Top 25). βοΈ Demonstrated experience contributing to purple team exercises and working closely with SOC to improve detection logic. βοΈ Strong hands-on experience with industry-standard tools (Burp Suite Pro, Metasploit, Nmap, etc.) and ability to develop custom automation (Python, Go, PowerShell, Bash). βοΈ Solid knowledge of network protocols (TCP/IP, HTTP/S, DNS), operating systems (Linux, Windows), and cloud-native architectures (Docker, Kubernetes). βοΈ Excellent communication skills, with the ability to clearly present critical business risks to both technical and non-technical stakeholders.