Life360

Staff Security Engineer, Penetration Testing

Life360

full-time

Posted on:

Origin:  • 🇺🇸 United States

Visit company website
AI Apply
Apply

Salary

💰 $165,000 - $242,500 per year

Job Level

Lead

Tech Stack

AWSCloud

About the role

  • Serve as a trusted offensive security expert leading penetration testing and red team activities across mobile applications, APIs, AWS cloud environments, and hardware devices.
  • Identify vulnerabilities that matter, design real-world attack simulations, and provide clear guidance to engineering teams to close security gaps.
  • Develop proof-of-concept exploits and technical reports that communicate risk and drive remediation.
  • Validate defensive controls and influence improvements based on offensive findings.
  • Partner with product, cloud, and hardware engineering teams to embed security into the design and development lifecycle.
  • Build tools, automation, and repeatable methodologies to scale penetration testing across Life360’s ecosystem.
  • Mentor engineers and share offensive security knowledge to raise security awareness across the company.
  • Stay ahead of emerging threats and offensive security techniques to ensure platform durability.

Requirements

  • 7+ hands-on experience in penetration testing with a focus on mobile applications, APIs, AWS cloud environments, and hardware devices.
  • Deep expertise in offensive security techniques, exploit development, and red teaming.
  • Proficient knowledge of common vulnerabilities, attack vectors, and frameworks such as OWASP, MITRE ATT&CK, and NIST.
  • Proficiency with modern penetration testing tools and the ability to build custom scripts and exploits when needed.
  • Ability to clearly communicate technical findings to both engineers and business stakeholders, translating risk into actionable outcomes.
  • Experience collaborating with cross-functional teams and influencing secure design decisions.
  • Good at solving problems, enthusiastic to learn, and able to adjust swiftly in a bustling environment.
  • Interest for staying ahead of emerging threats and continuously raising the bar for security.
  • Nice to have: Offensive security certifications such as OSCP, OSWE, OSEE, CREST, or GXPN.
  • Nice to have: Experience with hardware hacking, reverse engineering, or firmware analysis.
  • Nice to have: Knowledge of secure software development practices and the ability to influence design reviews.
  • Nice to have: Knowledge with security automation frameworks and custom tool development.
  • Nice to have: Prior experience leading red team engagements or building offensive security programs.
  • Nice to have: Background in threat modeling, exploit research, or vulnerability discovery at scale.
  • Nice to have: Proficient contributions to the security community through research, publications, or open-source projects.