Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
π€ 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

BrainRocket β’ Yerevan, Armenia
Salary: 20 working days of pa
Role & seniority: Penetration Testing Team Lead (senior, hands-on leader)
Stack/tools: Burp Suite Pro, Metasploit, Nmap; custom automation (Python, Go, PowerShell, Bash); cloud (AWS, Azure, GCP); container tech (Docker, Kubernetes); SIEM/EDR concepts; OS & network basics (Linux/Windows, TCP/IP, HTTP/S, DNS)
Build the Offensive Security function from scratch: methodologies, reporting standards, future team roadmap; recruit and mentor engineers
Lead end-to-end penetration testing for critical assets; focus on realistic attack scenarios (not just bug-bounty style)
Run purple team exercises with SOC/Blue Team; work with Application Security to validate findings and drive remediation; translate findings into threat intel and TTPs
5+ years hands-on penetration testing across web, mobile, API, and cloud (AWS/Azure/GCP)
Experience establishing offensive security processes/tools; hands-on (70β80%) role
Mastery of pentest methodologies (OWASP Top 10, SANS Top 25); purple team collaboration with SOC
Proficient with industry tools and custom automation (Python/Go/PowerShell/Bash); strong network/protocol/OS knowledge; cloud-native architecture
Excellent communication to present risks to technical and non-technical stakeholders
OSCP/OSCE/OSWE, CRTP, SANS GIAC; experience in fast-growing Gaming/Fintech environments
Location & work type: office-based role; location
BrainRocket is a global company creating end-to-end tech products for clients across Fintech, iGaming, and Marketing. βYoung, ambitious, and unstoppable, we've already taken Cyprus, Malta, Portugal, Poland, and Serbia by storm. Our BRO team consists of 1,300 bright minds creating innovative ideas and products. We donβt follow formats. We shape them. We build what works, launch it fast, and make sure it hits. We invite a Penetration Testing Team Lead to join our team. It's an office-based role. Core Mission To lead and grow the Offensive Security function while maintaining a strong hands-on role. Leverage an attacker mindset to identify critical business logic vulnerabilities and attack paths (kill chains), drive collaboration with Application Security and Security Operations teams, and lead purple team activities.
βοΈ Build the Offensive security function from the ground up: define methodologies, reporting standards, and the hiring plan for future team expansion. βοΈ Recruit, mentor, and develop the team of offensive security engineers, ensuring technical excellence and consistent delivery quality once hired. βοΈ Perform deep-dive manual penetration testing for complex, high-risk, or business-critical assets, focusing on realistic attack scenarios rather than high-volume "bug-bounty style" findings. βοΈ Lead and coordinate purple team exercises with the SOC/Blue Team, simulating real-world attacks to validate detection capabilities and tune SIEM/EDR rules. βοΈ Collaborate closely with the Application Security Team to validate vulnerabilities and guide effective remediation strategies. βοΈ Translate offensive findings into actionable threat intelligence, TTPs, and recommendations to enhance detection and threat hunting. βοΈ Act as a subject matter expert in security architecture discussions, secure design reviews, and security code reviews. βοΈ Stay current with emerging attack techniques, tools, and security trends, and ensure knowledge is shared within the engineering teams.
βοΈ Strong "playing coach" mindset: willingness to remain highly hands-on (70-80%) while setting up the function. βοΈ Deep understanding of penetration testing methodologies and frameworks (OWASP Top 10, SANS Top 25). βοΈ Demonstrated experience contributing to purple team exercises and working closely with SOC to improve detection logic. βοΈ Strong hands-on experience with industry-standard tools (Burp Suite Pro, Metasploit, Nmap, etc.) and ability to develop custom automation (Python, Go, PowerShell, Bash). βοΈ Solid knowledge of network protocols (TCP/IP, HTTP/S, DNS), operating systems (Linux, Windows), and cloud-native architectures (Docker, Kubernetes). βοΈ Excellent communication skills, with the ability to clearly present critical business risks to both technical and non-technical stakeholders.