Security Engineer - Offensive Security

Stripe Stripe · Fintech · Ireland · 8611 Security Analytics

Stripe's Proactive Threat team seeks an Offensive Security Engineer to identify vulnerabilities across systems, applications, networks, and cloud infrastructure. This role involves penetration testing, red teaming, and developing custom tooling and automation to enhance offensive capabilities. The engineer will simulate adversary tactics, techniques, and procedures (TTPs) to uncover security risks, partner with defensive teams, and contribute to incident investigations. Responsibilities include conducting tests on web applications, APIs, cloud environments, and mobile applications, planning red team engagements, and building offensive tools and platforms. The role requires strong programming skills (Python, Go), deep knowledge of web application security, cloud platforms, and offensive tooling, as well as familiarity with adversary tradecraft.

What you'd actually do

  1. Conduct comprehensive penetration tests across web applications, APIs, cloud environments (AWS/GCP/Azure), mobile applications, and internal infrastructure
  2. Plan and execute red team engagements that emulate the TTPs of cyber and criminal threat actors targeting financial services, including initial access, lateral movement, persistence, and data exfiltration scenarios
  3. Perform assumed-breach and objective-based assessments to test detection and response capabilities in coordination with defensive teams
  4. Partner with detection engineering, threat intelligence, and incident response teams to validate security controls, identify coverage gaps, and improve detection fidelity
  5. Design, develop, and maintain custom offensive tools, scripts, and automation frameworks to enhance assessment efficiency and coverage

Skills

Required

  • Offensive security
  • Penetration testing
  • Red teaming
  • Python
  • Go
  • Web application security
  • Cloud security (AWS, Azure, GCP)
  • Offensive tooling (Burp Suite, Cobalt Strike, etc.)
  • MITRE ATT&CK framework
  • Adversary emulation
  • Vulnerability assessment
  • Risk communication

Nice to have

  • Fintech security experience
  • Financial services security experience
  • Regulated environment experience

What the JD emphasized

  • Strong programming skills in Python, Go, or similar languages, with demonstrated experience building tools, automation, or custom exploits
  • Deep knowledge of web application security, including OWASP Top 10, ASVS, and common vulnerability classes (injection, auth flaws, business logic, etc.)
  • Hands-on experience with cloud platforms (AWS, Azure, or GCP), including cloud-native attack techniques and misconfigurations
  • Proficiency with offensive tooling such as Burp Suite, Cobalt Strike, Mythic, Sliver, BloodBloodHound, or similar frameworks
  • Familiarity with adversary tradecraft and frameworks such as MITRE ATT&CK, including TTPs for initial access, privilege escalation, lateral movement, and exfiltration