Hiring We're hiring senior practitioners: Penetration Tester and SOC L2 Analyst. Remote-friendly. Email us
Careers · 02 open roles

Build a career alongside practitioners who ship.

Secure Purple is a boutique cybersecurity team: real engagements, senior peers, no filler. We hire people who write the findings, not people who forward them. If you want ownership from day one, read on.

Open roles
02
Work style
Remote-first
Apply to
malik@securepurple.com
Reply window
< 7 days
Open Positions

Currently hiring.

Include the job number in your subject line.
Offensive Security 3–4 yrs experience Full-time Remote-friendly
Ref · SP-PT-001

Penetration Tester

Join the offensive security team. You'll run end-to-end assessments across web, mobile and web applications, produce client-ready reports, and partner with senior leads on scoping and retests.

What you'll do

  • Pentest web applications, mobile apps (Android / iOS) and broader web-app estates end-to-end.
  • Write client-ready findings with reproduction steps, impact and concrete remediation.
  • Own scoping discussions, retests and debriefs alongside senior engagement leads.
  • Contribute to internal tooling, methodology and public research write-ups.

What we're looking for

  • 3–4 years hands-on penetration testing experience.
  • Confident across web, mobile and web application testing.
  • Required certifications: eJPT, CEH, CPSA.
  • Clear technical writing. Your report is the product.

Nice to have

  • Public bug-bounty track record (HackerOne, Bugcrowd, Intigriti).
  • CVEs, CTF placements or published research.
Defensive Security 2–3 yrs experience Full-time Remote-friendly
Ref · SP-SOC-002

SOC L2 Analyst

We're hiring a SOC L2 analyst to work across AI-assisted detection and automation, triaging alerts, running analysis, and shaping how we operationalise AI in the SOC.

What you'll do

  • Triage and investigate escalated alerts from L1: endpoint, network, identity and cloud.
  • Build and refine AI-assisted detection, enrichment and response playbooks.
  • Own SOAR automations: reduce toil, raise signal, document every flow.
  • Lead deep-dive analysis on incidents and feed findings back into detections.

What we're looking for

  • 2–3 years SOC / blue-team experience at L1 or early L2.
  • Hands-on with AI solutions & automation in a detection or response context.
  • Strong analysis and triage instincts: calm under real alerts, not just tabletop drills.
  • Comfortable writing runbooks, playbooks and incident summaries.

Nice to have

  • Exposure to SIEM tuning, threat hunting or purple-team exercises.
  • Scripting: Python, PowerShell, KQL / SPL.
Don't see your role?

We occasionally hire off-cycle for senior offensive, defensive and GRC practitioners. Send a short note and recent work.

Send a speculative application
A Straightforward Hiring Process

Short CV. Technical conversation. Hands-on exercise. Offer.

No 7-round ladders. You'll talk to the people you'll actually work with, and we'll reply within a week, yes or no.