Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
π€ 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

BrainRocket β’ Warsaw, Masovian Voivodeship, Poland
Salary: 20 working days of pa
Role & seniority
Stack/tools
Penetration testing: web, mobile, API, cloud (AWS/Azure/GCP)
Tools: Burp Suite Pro, Metasploit, Nmap; SIEM/EDR tuning
Automation: Python, Go, PowerShell, Bash
Cloud-native: Docker, Kubernetes; networks (TCP/IP, HTTP/S, DNS); Linux/Windows
Top 3 responsibilities
Build and scale the offensive security function: define methodologies, reporting standards, and hiring roadmap.
Recruit, mentor, and develop offensive security engineers; maintain hands-on delivery quality.
Lead end-to-end penetration testing (high-risk assets) and coordinate purple team activities with SOC/Blue Team; translate findings into threat intelligence and remediation guidance.
Must-have skills
5+ years hands-on pentesting (web, mobile, API, cloud)
Experience building offensive security processes/tools from scratch
Hands-on leadership style (70β80% hands-on); strong communication to technical and non-technical audiences
Proficiency in pentest methodologies/frameworks (OWASP Top 10, SANS Top 25)
Experience with purple team exercises; collaboration with SOC and AppSec
Proficient with Burp Suite Pro, Metasploit, Nmap; ability to develop automation (Python/Go/PowerShell/Bash)
Networking, OS (Linux/Windows), cloud-native (Docker, Kubernetes)
Nice-to-haves
Advanced certifications (OSCP/OSCE/OSWE, CRTP, SANS GIAC)
Experience in fast-growth sectors (Gaming/Fintech) and domain-speci
BrainRocket is a global company creating end-to-end tech products for clients across Fintech, iGaming, and Marketing. βYoung, ambitious, and unstoppable, we've already taken Cyprus, Malta, Portugal, Poland, and Serbia by storm. Our BRO team consists of 1,300 bright minds creating innovative ideas and products. We donβt follow formats. We shape them. We build what works, launch it fast, and make sure it hits. We invite a Penetration Testing Team Lead to join our team. It's an office-based role. Core Mission To lead and grow the Offensive Security function while maintaining a strong hands-on role. Leverage an attacker mindset to identify critical business logic vulnerabilities and attack paths (kill chains), drive collaboration with Application Security and Security Operations teams, and lead purple team activities.
βοΈ Build the Offensive security function from the ground up: define methodologies, reporting standards, and the hiring plan for future team expansion. βοΈ Recruit, mentor, and develop the team of offensive security engineers, ensuring technical excellence and consistent delivery quality once hired. βοΈ Perform deep-dive manual penetration testing for complex, high-risk, or business-critical assets, focusing on realistic attack scenarios rather than high-volume "bug-bounty style" findings. βοΈ Lead and coordinate purple team exercises with the SOC/Blue Team, simulating real-world attacks to validate detection capabilities and tune SIEM/EDR rules. βοΈ Collaborate closely with the Application Security Team to validate vulnerabilities and guide effective remediation strategies. βοΈ Translate offensive findings into actionable threat intelligence, TTPs, and recommendations to enhance detection and threat hunting. βοΈ Act as a subject matter expert in security architecture discussions, secure design reviews, and security code reviews. βοΈ Stay current with emerging attack techniques, tools, and security trends, and ensure knowledge is shared within the engineering teams.
βοΈ Strong "playing coach" mindset: willingness to remain highly hands-on (70-80%) while setting up the function. βοΈ Deep understanding of penetration testing methodologies and frameworks (OWASP Top 10, SANS Top 25). βοΈ Demonstrated experience contributing to purple team exercises and working closely with SOC to improve detection logic. βοΈ Strong hands-on experience with industry-standard tools (Burp Suite Pro, Metasploit, Nmap, etc.) and ability to develop custom automation (Python, Go, PowerShell, Bash). βοΈ Solid knowledge of network protocols (TCP/IP, HTTP/S, DNS), operating systems (Linux, Windows), and cloud-native architectures (Docker, Kubernetes). βοΈ Excellent communication skills, with the ability to clearly present critical business risks to both technical and non-technical stakeholders.