Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
🤖 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

SYBER Services • Melbourne, Victoria, Australia
Role & seniority: Penetration Tester, 2+ years of hands-on experience; active NV1 clearance or higher.
Stack/tools: web, API and infrastructure penetration testing; vulnerability validation and exploitation; reporting; operates within OWASP and PTES frameworks.
Deliver web, API, and infrastructure penetration tests.
Validate and exploit vulnerabilities responsibly; chain weaknesses to demonstrate real risk.
Produce clear, well-structured reports and operate within defined scope and engagement rules.
Active NV1 clearance or higher.
2+ years of hands-on penetration testing experience.
Strong understanding of common vulnerabilities and attack techniques; ability to explain technical risk to technical and non-technical stakeholders; curiosity, judgement, and technical depth.
Location & work type: flexible working arrangements with remote work possible depending on client requirements; on-site engagements may be required.
SYBER is expanding its offensive security capability and we’re looking for a Penetration Tester with an active NV1 clearance or higher.
Not because it looks impressive on a CV. Because some of the environments we operate in require it.
If you have at least a couple of years of real-world testing behind you and want to sharpen your craft in structured, enterprise engagements, keep reading.
What you’ll be doing
Delivering web, API and infrastructure penetration tests
Validating and exploiting vulnerabilities responsibly
Chaining weaknesses together to demonstrate real risk
Producing clear, well-structured reports
Operating within defined scope, rules of engagement and professional standards such as OWASP and PTES
No chaos. No production “accidents.” Just disciplined offensive security.
What we’re looking for
Active NV1 clearance or higher
2+ years hands-on penetration testing experience
Strong understanding of common vulnerabilities and attack techniques
Ability to clearly explain technical risk to both technical and non-technical stakeholders
Curiosity, judgement and technical depth
Certifications are welcome. Capability matters more.
What you’ll get
Exposure to complex enterprise environments
Mentorship from experienced operators
Investment in your ongoing skills development, training and certifications
Flexible working arrangements, including remote work depending on client requirements