Are you early in your offensive security career and hungry to break into some serious work? Join a tight-knit team where you'll get hands-on fast, grow your skills under the guidance of experienced operators, and leave cookie-cutter pentesting behind. If you’ve got the passion, we’ve got the playground.
Your Mission (Should You Choose to Accept It):
We’re looking for an
Associate Offensive Security Consultant to join the crew supporting a long-term, market-leading client. Expect to jump into penetration tests, vulnerability assessments, and a little bit of red teaming (because why should the seniors have all the fun?).
What You’ll Get Stuck Into: - Work directly with real-world clients on infrastructure and web application pentests.
- Contribute to red and purple team engagements.
- Build your toolkit — scripting, reporting, exploit development, methodology refinement.
- Learn from senior red teamers who’ll actually mentor you (no sink-or-swim nonsense).
What You’ll Need:
- ~1+ year of hands-on penetration testing experience (web apps and/or infrastructure).
- A certification or two under your belt (OSCP, eJPT, or working towards one is ideal).
- A curious mindset — you love figuring out how things break (and how to explain it to others).
- Some client exposure — or at least the willingness to jump on calls and explain your findings clearly.
- Bonus points if you’ve dabbled in CTFs, open-source projects, or community events.
Perks That Don't Suck: - Training Allowance + Research Time: Because sharp tools matter.
- Hybrid Work: Mix of office, client site, and WFH.
- Volunteer Days: Paid days off to give back.
- Salary Sacrificing: Including novated leasing.
- Fun Culture: Internal CTFs, national conferences, team hackathons — plus actual career progression.
Salary: Up to
$110k + super.
Working Rights: AU Citizens or PR in Brisbane only.
How to Get On Board: Shoot your CV over to
Kris at
kris@decipherbureau.com. But don’t just list your skills — tell us:
- What got you hooked on offensive security?
- Your favourite hack or tool so far.
- A recent CTF, lab, or vuln you tackled (even if you didn’t pop the shell).
The Interview Process: - Chat: Meet and greet (coffee optional but encouraged).
- Challenge: Short CTF exercise and write-up to show your thinking.
Got questions? Call Kris on
0452 564 644.