Cyber Red Team Associate
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, Information Security, Security Manager
Employer
Parliamentary Digital Service
DirectorateCyber and Information Security
Band / GradeB2
Salary£36,379 - £40,775 (Excluding £2,000 MSA)
Contract TypePermanent
LocationHybrid (remote and on-site - Westminster, London)
Security LevelSecurity Check (SC)
Interview FormatPanel Interviews (On-Site)
The OpportunityAs a Red Team Associate, you’ll help safeguard the systems that support the UK’s democratic processes. You’ll think like an attacker, act like an adversary, and work proactively to uncover weaknesses before they can be exploited.
Joining a high-performing Cyber Security function, you’ll support the delivery of penetration testing, vulnerability management, and threat intelligence activities that directly strengthen Parliament’s security posture. You’ll simulate real-world threat actors, test critical security controls, and translate technical findings into meaningful improvements.
Working closely with colleagues across the Cyber Security Operations Centre (CSOC), you’ll bridge offensive insight with defensive action - ensuring Parliament’s cyber resilience is continuously challenged, validated, and improved.
If you’re driven by purpose, curious by nature, and ready to sharpen your offensive skillset in a nationally significant environment, this is your opportunity to make a real impact.
- Learn to scope, procure, and conduct penetration tests to highlight vulnerabilities and risks within systems used seminate the results of these tests to service owners and key stakeholders and assist in translating their findings into action plans that strengthen security posture.
- Help assess and manage vulnerabilities present on Parliamentary systems, using tooling to perform discovery tasks to ensure wide coverage. Liaise with service owners to relay findings and provide guidance. Work with the Red Team in utilising vulnerabilities in real-life exploitation scenarios to provide risk evidence.
- Assist in answering Priority Intelligence Requirements. Use tooling to perform threat hunting, enriching our defensive capabilities with indicators of compromise and detection rules.
- Contribute to maintaining up-to-date threat profiles through research and enrich areas such as vulnerability management with relevant threat intelligence.
- Support shaping red team and tabletop exercises by tuning employed TTP’s (tactics, techniques, and procedures) and learn to match those used by threat actors identified as targeting Parliament.
- Good knowledge of cyber security, providing advice to others. Understands and can apply basic principles of risk assessment, risk management processes and decision-making.
- An ability to build knowledge of Parliament’s cyber security challenges, understanding the parliamentary business context. Utilise threat assessment principles to acquire, validate and analyse relevant threat information, enterprise attack vectors, and critical organisational functions.
- Understands the principals of penetration and vulnerability testing. Experience in conducting assessments and documenting findings. Contribute to the review and interpretation of assessment reports and help form action plans.
- Knowledge of scripting languages such as Python, Power Shell, or Bash. Understands basic coding techniques and how repetitive tasks could be automated via code.
- Excellent written and verbal communication skills. Ability to deliver complex technical information clearly and effectively to a variety of senior management and key stakeholders with different levels of expertise.
- Ability to work successfully within a team, contributing to a safe-to-fail environment, whilst upholding the values of equality, diversity and inclusion.
- The ability to pass security clearance, backed by the right to work in the UK.
The Cyber Security team must remain switched on to geopolitical and domestic activity in order to protect its people, data, and technology. The team is responsible for operational cyber security including logging and monitoring, incident response, threat and vulnerability management, intelligence-led penetration testing, development of cyber security policies and standards, security architecture, forensic…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: