Offensive Security Engineer

Meta Meta · Big Tech · Bellevue, WA

Offensive Security Engineer role focused on conducting security engagements, threat-based evaluations, and vulnerability research against internal and external systems. Responsibilities include researching and executing adversary TTPs, collaborating with security teams for remediation, and automating assessment tasks. Requires a degree in CS/Cybersecurity, scripting/coding skills, understanding of attack lifecycle and offensive security concepts, and experience with common vulnerabilities and security controls.

What you'd actually do

  1. Conduct offensive security engagements, including Red Team operations, threat-based evaluations, and vulnerability research and exploitation against both internal and external facing systems.
  2. Research, develop, and execute adversary tactics, techniques, and procedures (TTPs) across the range of the attack lifecycle.
  3. Collaborate with cross-functional teams, including Incident Response, Product Security, and other security partners, to align remediation efforts and drive fixes after testing cycles.
  4. Automate portions of assessments, scoping, or other offensive security work to inform and drive our engagements.

Skills

Required

  • scripting and coding
  • adversary tactics, techniques, and procedures (TTPs)
  • attack lifecycle
  • offensive security concepts
  • exploiting common security vulnerabilities
  • bypassing security controls
  • Network security
  • Web application security
  • desktop application security
  • mobile application security
  • source code review
  • fuzzing
  • analysis
  • reverse engineering
  • exploit development
  • vulnerability research

What the JD emphasized

  • Requires a Bachelor’s degree (or foreign degree equivalent) in Computer Science, Cybersecurity, or related field
  • Requires completion of university-level coursework, research project or internship involving the following
  • High level scripting and coding
  • Research, develop, and execute adversary tactics, techniques, and procedures (TTPs) across the range of the attack lifecycle
  • Understanding of the attack lifecycle, and offensive security concepts in Red Team operations
  • Experience with exploiting common security vulnerabilities and bypassing security controls
  • Experience in at least one of the following security areas - Network security, Web, desktop and/or mobile application security, source code review, fuzzing and/or analysis, reverse engineering, exploit development and/or vulnerability research