{"version":"0.1","company":{"name":"YubHub","url":"https://yubhub.co","jobsUrl":"https://yubhub.co/jobs/skill/cobalt-strike"},"x-facet":{"type":"skill","slug":"cobalt-strike","display":"Cobalt Strike","count":3},"x-feed-size-limit":100,"x-feed-sort":"enriched_at desc","x-feed-notice":"This feed contains at most 100 jobs (the most recently enriched). For the full corpus, use the paginated /stats/by-facet endpoint or /search.","x-generator":"yubhub-xml-generator","x-rights":"Free to redistribute with attribution: \"Data by YubHub (https://yubhub.co)\"","x-schema":"Each entry in `jobs` follows https://schema.org/JobPosting. YubHub-native raw fields carry `x-` prefix.","jobs":[{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_d45d4d8b-45e"},"title":"Senior Engineer, Offensive Security","description":"<p>Who we are At Twilio, we&#39;re shaping the future of communications, all from the comfort of our homes. We deliver innovative solutions to hundreds of thousands of businesses and empower millions of developers worldwide to craft personalized customer experiences.  As we continue to revolutionize how the world interacts, we&#39;re acquiring new skills and experiences that make work feel truly rewarding.  Your career at Twilio is in your hands.  We use Artificial Intelligence (AI) to help make our hiring process efficient. That said, every hiring decision is made by real Twilions!  Join the team as Twilio&#39;s next Senior Offensive Security Engineer  About the job This position is needed to The Senior OffSec Engineer will be responsible for the day-to-day execution of penetration tests and contributing to larger Red Team campaigns. You move beyond simple scanning to manual exploitation and are beginning to automate your workflows.  Responsibilities In this role, you&#39;ll:  <em> Full-Stack Penetration Testing: Perform manual and automated testing of web applications, APIs, and mobile apps (iOS/Android). </em> Internal/External Network Audits: Conduct network and cloud level assessments with various tooling <em> Vulnerability Validation: Triage and validate reports from automated scanners or bug bounty hunters to eliminate false positives and escalate true positives </em> AI/LLM Probing: Perform initial prompt injection and jailbreak tests on AI prototypes, services, and applications using established checklists (OWASP Top 10 for LLMs). <em> Technical Reporting: Draft high-quality reports that detail the &quot;path to compromise&quot; with clear, reproducible steps for developers. </em> Tool Maintenance: Manage and update the team&#39;s testing infrastructure (e.g., Burp Suite, and basic C2 listeners). <em> Remediation Support: Provide direct technical guidance to engineering teams on how to patch vulnerabilities like XSS, SQLi, and IDOR. </em> Adversary Emulation: Design and lead multi-week Red Team operations that mimic specific threat actors (APTs) to test the SIRT detection capabilities. <em> Custom Exploit Development: Build custom payloads, droppers, and obfuscated scripts to bypass EDR/AV and maintain stealth. </em> AI Red Teaming Architecture: Build automated testing frameworks for AI systems (e.g., using PyRIT, Promptfoo, or Garak) to test for models related to sensitive data leakage. <em> Cloud &amp; Infrastructure Attacks: Execute sophisticated attacks against AWS/Azure/K8s, focusing on IAM misconfigurations and container escapes. </em> Purple Teaming: Collaborate with SIRT and Detection Engineering to tune SIEM alerts based on the techniques used during an engagement. <em> Strategic Bug Bounty Management: Oversee the organization&#39;s bug bounty program, identifying trends in submissions to suggest broad architectural security changes.  </em>Required: <em> Experience: 3–5 years in offensive security, penetration testing, or a high-volume bug bounty background and track record of finding high/critical vulnerabilities in complex environments. </em> Concepts: Expert Knowledge and solid understanding of the MITRE ATT&amp;CK matrix and the OWASP Top 10 for web applications and top 10 for LLMs, post exploitation (lateral movement, persistence, data exfiltration) and Adversarial ML. <em> Tooling: Proficient in Burp Suite professional, Nmap, Metasploit, Wireshark etc... and AI security tools such as LangChain, TensorFlow for adversarial testing, as well as use of C2 frameworks (Cobalt Strike, Sliver, Havoc) or similar tools </em> Scripting and Coding: Ability to write functional scripts in Python or Bash to automate repetitive testing tasks and proficiency in Python, C++, and scripting for creating custom offensive tooling that avoids signature-based detection. <em> Certifications: Possession of advanced industry certifications such as OSCP, OSEP, OSWE, GXPN or similar </em> Telecom expertise is preferred</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_d45d4d8b-45e","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Twilio","sameAs":"https://www.twilio.com/","logo":"https://logos.yubhub.co/twilio.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/twilio/jobs/7622278","x-work-arrangement":"remote","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"\",   \"salaryMin\": \"\",   \"salaryMax\": \"\",   \"salaryCurrency\": \"USD\",   \"salaryPeriod\": \"year","x-skills-required":["Burp Suite","Nmap","Metasploit","Wireshark","LangChain","TensorFlow","Cobalt Strike","Sliver","Havoc","Python","Bash","C++","OSCP","OSEP","OSWE","GXPN"],"x-skills-preferred":[],"datePosted":"2026-04-25T21:02:55.469Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Remote - India"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"Burp Suite, Nmap, Metasploit, Wireshark, LangChain, TensorFlow, Cobalt Strike, Sliver, Havoc, Python, Bash, C++, OSCP, OSEP, OSWE, GXPN"},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_142655a8-403"},"title":"Red Team Security Engineer","description":"<p>Astranis is looking for a Red Team Security Engineer who thinks like an adversary and views security as an art form. Our ideal candidate thrives on the challenge of finding novel ways to bypass defenses and has a natural talent for uncovering hidden attack paths.</p>\n<p>Role: Actively devise and execute sophisticated, multi-stage attack campaigns that emulate the tactics, techniques, and procedures (TTPs) of relevant threat actors. Identify and exploit vulnerabilities across the organisation&#39;s digital and physical landscapes, including networks, applications, facilities, and personnel. Conduct covert red team operations, including network penetration testing, application security assessments, social engineering, and physical security breach simulations. Lead and participate in purple team exercises, working collaboratively with the blue team to analyse attack paths, test detection capabilities, and improve incident response playbooks in real-time. Assess the effectiveness of remediation efforts by re-testing identified vulnerabilities and attack paths after fixes have been implemented. Develop custom tooling and scripts to automate and enhance attack simulations. Create detailed post-engagement reports that clearly document findings, articulate business risk, and provide actionable recommendations for improving security posture. Act as the resident subject matter expert on offensive security and threat actor methodologies.</p>\n<p>Requirements: 3+ years of experience in an offensive security role (e.g., Red Teaming, Penetration Testing). Proven experience in planning and executing covert red team operations from reconnaissance to objective completion. A deep understanding of attacker TTPs and frameworks like MITRE ATT&amp;CK. Proficient in at least one scripting language, such as Python, for tooling and automation. Hands-on experience with common offensive security tools (e.g., Cobalt Strike, Metasploit, Burp Suite, custom implants). Strong analytical and problem-solving skills with a creative and unconventional mindset. Ability to work both independently and collaboratively in a team environment. Excellent written and oral communication skills, with the ability to articulate complex technical risks to both technical and non-technical audiences.</p>\n<p>Bonus: Any relevant certifications such as OSCP, OSCE, or OSEP. Experience with physical security assessments or social engineering campaigns. Previous experience building and running a red team program.</p>\n<p>What we offer: All our positions offer a compensation package that includes equity and robust benefits. Base pay is just one component of Astranis’s total rewards package. Your compensation also includes a significant equity package via incentive stock options, high-quality company-subsidized healthcare, disability and life insurance, 401(k) retirement planning, flexible PTO, and free on-site catered meals.</p>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_142655a8-403","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Astranis","sameAs":"https://astranis.com/","logo":"https://logos.yubhub.co/astranis.com.png"},"x-apply-url":"https://job-boards.greenhouse.io/astranis/jobs/4667338006","x-work-arrangement":"onsite","x-experience-level":"senior","x-job-type":"full-time","x-salary-range":"$130,000-$205,000 USD\",   \"salaryMin\": 130000,   \"salaryMax\": 205000,   \"salaryCurrency\": \"USD\",   \"salaryPeriod\": \"year","x-skills-required":["offensive security","red teaming","penetration testing","MITRE ATT&CK","Python","Cobalt Strike","Metasploit","Burp Suite","custom implants"],"x-skills-preferred":[],"datePosted":"2026-04-24T15:21:23.323Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco"}},"employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"offensive security, red teaming, penetration testing, MITRE ATT&CK, Python, Cobalt Strike, Metasploit, Burp Suite, custom implants","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":130000,"maxValue":205000,"unitText":"YEAR"}}},{"@context":"https://schema.org","@type":"JobPosting","identifier":{"@type":"PropertyValue","name":"YubHub","value":"job_81a600f4-518"},"title":"Member of Technical Staff (Offensive Security Engineer)","description":"<p>Perplexity is seeking a highly skilled Offensive Security Engineer to join our dynamic security team. The successful candidate will take an adversarial approach to hardening Perplexity&#39;s infrastructure, applications, and AI systems.</p>\n<p>You will plan and execute red team operations, penetration tests, and attack simulations across our cloud infrastructure, web and mobile applications, AI/ML pipeline, and corporate environment,finding real vulnerabilities before adversaries do and working directly with engineering teams to drive remediation.</p>\n<p>Responsibilities:</p>\n<ul>\n<li>Plan and execute red team and purple team engagements simulating advanced threat actors across cloud infrastructure (AWS, Kubernetes), endpoints, and application surfaces</li>\n<li>Conduct continuous penetration testing of web applications, APIs, mobile clients, browser extensions, cloud infrastructure, and internal services</li>\n<li>Assess AI/ML-specific attack surfaces including prompt injection, model exfiltration, agent abuse, tool-use exploitation, and MCP security boundaries</li>\n<li>Develop and maintain custom offensive tooling, exploits, and automation to improve the efficiency and coverage of security testing</li>\n<li>Perform open-scope adversary simulations that test detection and response capabilities end to end, collaborating closely with the defensive security team</li>\n<li>Drive threat modeling sessions with engineering teams to identify and prioritize attack vectors in new features and architectures</li>\n<li>Deliver clear, actionable findings to both technical and executive audiences; partner with engineering to validate remediations</li>\n<li>Contribute to the security of CI/CD pipelines, supply chain integrity, and secrets management through offensive assessment</li>\n<li>Stay current on emerging attack techniques, vulnerability research, and adversary tradecraft; bring external perspective into Perplexity&#39;s security strategy</li>\n</ul>\n<p>Qualifications:</p>\n<ul>\n<li>5+ years of hands-on experience in offensive security, red teaming, or penetration testing</li>\n<li>Deep technical expertise in at least two of: cloud security (AWS/GCP/Azure), web/API application security, Kubernetes and container security, macOS/Linux endpoint security, network penetration testing, or CI/CD pipeline security</li>\n<li>Track record of discovering impactful vulnerabilities or developing novel attack techniques in production environments</li>\n<li>Strong programming and scripting skills in Python, Go, or similar languages; comfortable writing custom tooling and exploits</li>\n<li>Experience with industry-standard offensive tools (Burp Suite, Cobalt Strike / Sliver / Mythic, Metasploit, BloodHound, nuclei, etc.) and ability to operate beyond them</li>\n<li>Excellent written and verbal communication; able to translate complex technical findings into clear risk narratives</li>\n<li>Experience assessing AI/ML systems, LLM applications, or agentic workflows for security vulnerabilities</li>\n<li>Bonus: Published security research, conference talks (DEF CON, Black Hat, BSides), CVE credits, or meaningful bug bounty contributions</li>\n</ul>\n<p style=\"margin-top:24px;font-size:13px;color:#666;\">XML job scraping automation by <a href=\"https://yubhub.co\">YubHub</a></p>","url":"https://yubhub.co/jobs/job_81a600f4-518","directApply":true,"hiringOrganization":{"@type":"Organization","name":"Perplexity","sameAs":"https://perplexity.com","logo":"https://logos.yubhub.co/perplexity.com.png"},"x-apply-url":"https://jobs.ashbyhq.com/perplexity/69fd6a56-0050-44f7-9ed2-2c3a7320908d","x-work-arrangement":"hybrid","x-experience-level":"staff","x-job-type":"Full time","x-salary-range":"$220K – $405K","x-skills-required":["cloud security","web/API application security","Kubernetes and container security","macOS/Linux endpoint security","network penetration testing","CI/CD pipeline security","Python","Go","Burp Suite","Cobalt Strike","Metasploit","BloodHound","nuclei"],"x-skills-preferred":[],"datePosted":"2026-04-24T13:15:56.086Z","jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"San Francisco; London; New York City; Remote (United States); Serbia"}},"jobLocationType":"TELECOMMUTE","employmentType":"FULL_TIME","occupationalCategory":"Engineering","industry":"Technology","skills":"cloud security, web/API application security, Kubernetes and container security, macOS/Linux endpoint security, network penetration testing, CI/CD pipeline security, Python, Go, Burp Suite, Cobalt Strike, Metasploit, BloodHound, nuclei","baseSalary":{"@type":"MonetaryAmount","currency":"USD","value":{"@type":"QuantitativeValue","minValue":220000,"maxValue":405000,"unitText":"YEAR"}}}]}