
Explore more
Tech Stack
About the role
- Triage output from our AI offensive engine, validating real vulnerabilities and separating signal from noise.
- Vulnerability analysis of false positives to identify root causes, improve detection logic, and refine model behavior.
- Collaborate with Product, R&D, and AI teams to provide structured feedback on exploit quality, edge cases, and system behavior.
- Analyze discovered vulnerabilities in depth and support AI driven reporting.
- Support customers by helping them understand findings, reproduce issues, and validate impacts.
- Develop repeatable methodologies for evaluating exploit chains, proof-of-concept behavior, and attack patterns.
- Own investigations end-to-end, from initial triage to deep-dive analysis to final recommendations for fix or model improvement.
- Continuously research new vulnerability classes, exploitation techniques, and reverse engineering workflows to help evolve the platform.
Requirements
- Deep hands-on penetration testing experience, primarily in application, web and cloud
- Experience validating and reproducing vulnerabilities, including crafting PoCs and assessing exploitability.
- Strong ability to distinguish real issues from false positives, with a methodical and evidence-driven mindset.
- Experience with common offensive tooling (Burp, Nmap, Metasploit, Ghidra, IDA, custom scripts, etc.).
- Strong written communication skills - able to clearly articulate technical findings to both engineers and customers.
- Comfort working in fast-moving, ambiguous environments where problems are not fully defined.
- Curiosity, adaptability, and a willingness to dive deep and learn continuously.
- Prior experience collaborating closely with software engineering, research, or product teams.
- Background in exploit development, fuzzing, or vulnerability research.
- Experience with large-scale systems, cloud environments, or CI/CD security.
- Experience contributing to or building offensive security tooling.
- Prior work in an early-stage startup or a high-velocity research environment.
- Experience in customer-facing technical roles and/or consulting.
Benefits
- Competitive salary and a generous equity package, making you a true owner of the company.
- Shape your role, influence product direction, and grow with the company as we redefine cybersecurity.
- You will work on some of the most technically challenging problems in security and help define how AI transforms offensive security - alongside world-class engineers, researchers, and hackers.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
penetration testingvulnerability analysisexploit developmentfuzzingvulnerability researchexploitability assessmentproof-of-concept (PoC) craftinglarge-scale systems securitycloud securityCI/CD security
Soft Skills
strong written communicationmethodical mindsetevidence-driven approachcuriosityadaptabilityproblem-solvingcollaborationcustomer-facing skillsability to work in ambiguitycontinuous learning