Enable job alerts via email!

Offensive Security Analyst

S-RM

London

On-site

GBP 40,000 - 70,000

Full time

18 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading company in cybersecurity solutions is seeking an Offensive Security Analyst to support its delivery of pentesting services. This role involves engaging with clients to solve security challenges, conducting penetration testing, and contributing to project management initiatives. The ideal candidate will have strong technical skills in cybersecurity and a commitment to professional development.

Qualifications

  • Experience with penetration testing and vulnerability assessments.
  • Strong client engagement and management skills.
  • Commitment to continuous professional development.

Responsibilities

  • Engaging with clients to understand cyber security challenges.
  • Conducting penetration testing and vulnerability assessments.
  • Delivering findings in various formats including reports and presentations.

Skills

Client Engagement
Penetration Testing
Threat Intelligence
Vulnerability Assessments
Project Management

Education

Certified Cyber Security Professional
Formal Training in Penetration Testing

Job description

Offensive Security Analysts support our delivery consultants running our offensive security services. They help to interpret client challenges, innovate solutions, and deliver findings. Our aim is to become trusted advisors to our clients.

You will work across the full spectrum of our pentesting services, whether point in time or continuous, as well as participate in larger engagements such as red teams. You will help our clients to build cyber resilience, enhance their understanding of the threat landscape and become better prepared to face dynamic and evolving security risks.

1.1 MAIN DUTIES AND RESPONSIBILITIES

Client Engagement and Account Management

  • Engage with clients to understand their cyber security challenges
  • Translate client challenges into solutions that fit S-RM's Offensive Security service offering and value proposition
  • Develop an understanding of delivery timelines, project resourcing requirements and pricing
  • Understand S-RM's proposal process and lead on proposal writing and presentations in some cases
  • Contribute to the expansion of client accounts and winning of new business
  • Gain an understanding of S-RM's target sectors and industries

Offensive Security

  • Penetration testing
    • Vulnerability assessments and monitoring
    • External infrastructure
    • External Attack Surface Management
    • Web application
    • API pentesting
    • Phishing and spear phishing
    • Internal pentesting
    • Mobile application pentesting (Android and iOS)
    • OT Pentesting
    • IOT Pentesting
    • Cloud Pentesting
    • Open-Source Intelligence (OSINT) gathering

  • Configuration Reviews
    • Cloud configuration review
    • Application configuration review
    • Hardware build review
    • Firewall review

  • Delivery & Client communications
    • Deliver findings in a range of formats, including written reports, presentations, and verbal briefings

  • Threat Intelligence
    • Keep abreast of threat intelligence developments, threat actor activity and security industry developments in mitigations and tooling
    • Develop and deliver client threat profiles, threat assessments and dark web analysis

Project Management

  • Support vCISO engagements, accessing the full range of S-RM's resources and expertise
  • Collaborate with incident response, ethical hacking, and digital forensics teams to integrate our services and support to clients
  • Support the delivery of retainer relationships
  • Support the delivery of the Attack Surface Management (ASM) service

Internal Initiatives and Strategy

  • Support internal initiatives on product development, process management, tech enablement, efficiency and exploring different ways to support clients
  • Contribute to the adaption of security frameworks to create innovative products
  • Challenge received wisdom and existing products and services. Suggest alternative approaches where appropriate
    • Develop documentation and evolve the testing methodologies where applicable

Professional Development and Domain Knowledge

  • Commit to continuous professional development and personal knowledge improvement across the full range of cyber security competencies, in line with personal utilisation targets (see Objectives)
  • Complete up to one formal training course over the financial year. This is beyond internal training sessions
  • Share knowledge with the wider team in line with company values, including contributing to internal training initiatives and programmes
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.