Salary
💰 $165,000 - $242,500 per year
About the role
- Serve as a trusted offensive security expert leading penetration testing and red team activities across mobile applications, APIs, AWS cloud environments, and hardware devices.
- Identify vulnerabilities that matter, design real-world attack simulations, and provide clear guidance to engineering teams to close security gaps.
- Develop proof-of-concept exploits and technical reports that communicate risk and drive remediation.
- Validate defensive controls and influence improvements based on offensive findings.
- Partner with product, cloud, and hardware engineering teams to embed security into the design and development lifecycle.
- Build tools, automation, and repeatable methodologies to scale penetration testing across Life360’s ecosystem.
- Mentor engineers and share offensive security knowledge to raise security awareness across the company.
- Stay ahead of emerging threats and offensive security techniques to ensure platform durability.
Requirements
- 7+ hands-on experience in penetration testing with a focus on mobile applications, APIs, AWS cloud environments, and hardware devices.
- Deep expertise in offensive security techniques, exploit development, and red teaming.
- Proficient knowledge of common vulnerabilities, attack vectors, and frameworks such as OWASP, MITRE ATT&CK, and NIST.
- Proficiency with modern penetration testing tools and the ability to build custom scripts and exploits when needed.
- Ability to clearly communicate technical findings to both engineers and business stakeholders, translating risk into actionable outcomes.
- Experience collaborating with cross-functional teams and influencing secure design decisions.
- Good at solving problems, enthusiastic to learn, and able to adjust swiftly in a bustling environment.
- Interest for staying ahead of emerging threats and continuously raising the bar for security.
- Nice to have: Offensive security certifications such as OSCP, OSWE, OSEE, CREST, or GXPN.
- Nice to have: Experience with hardware hacking, reverse engineering, or firmware analysis.
- Nice to have: Knowledge of secure software development practices and the ability to influence design reviews.
- Nice to have: Knowledge with security automation frameworks and custom tool development.
- Nice to have: Prior experience leading red team engagements or building offensive security programs.
- Nice to have: Background in threat modeling, exploit research, or vulnerability discovery at scale.
- Nice to have: Proficient contributions to the security community through research, publications, or open-source projects.