<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>d45d4d8b-45e</externalid>
      <Title>Senior Engineer, Offensive Security</Title>
      <Description><![CDATA[<p>Who we are At Twilio, we&#39;re shaping the future of communications, all from the comfort of our homes. We deliver innovative solutions to hundreds of thousands of businesses and empower millions of developers worldwide to craft personalized customer experiences.  As we continue to revolutionize how the world interacts, we&#39;re acquiring new skills and experiences that make work feel truly rewarding.  Your career at Twilio is in your hands.  We use Artificial Intelligence (AI) to help make our hiring process efficient. That said, every hiring decision is made by real Twilions!  Join the team as Twilio&#39;s next Senior Offensive Security Engineer  About the job This position is needed to The Senior OffSec Engineer will be responsible for the day-to-day execution of penetration tests and contributing to larger Red Team campaigns. You move beyond simple scanning to manual exploitation and are beginning to automate your workflows.  Responsibilities In this role, you&#39;ll:  <em> Full-Stack Penetration Testing: Perform manual and automated testing of web applications, APIs, and mobile apps (iOS/Android). </em> Internal/External Network Audits: Conduct network and cloud level assessments with various tooling <em> Vulnerability Validation: Triage and validate reports from automated scanners or bug bounty hunters to eliminate false positives and escalate true positives </em> AI/LLM Probing: Perform initial prompt injection and jailbreak tests on AI prototypes, services, and applications using established checklists (OWASP Top 10 for LLMs). <em> Technical Reporting: Draft high-quality reports that detail the &quot;path to compromise&quot; with clear, reproducible steps for developers. </em> Tool Maintenance: Manage and update the team&#39;s testing infrastructure (e.g., Burp Suite, and basic C2 listeners). <em> Remediation Support: Provide direct technical guidance to engineering teams on how to patch vulnerabilities like XSS, SQLi, and IDOR. </em> Adversary Emulation: Design and lead multi-week Red Team operations that mimic specific threat actors (APTs) to test the SIRT detection capabilities. <em> Custom Exploit Development: Build custom payloads, droppers, and obfuscated scripts to bypass EDR/AV and maintain stealth. </em> AI Red Teaming Architecture: Build automated testing frameworks for AI systems (e.g., using PyRIT, Promptfoo, or Garak) to test for models related to sensitive data leakage. <em> Cloud &amp; Infrastructure Attacks: Execute sophisticated attacks against AWS/Azure/K8s, focusing on IAM misconfigurations and container escapes. </em> Purple Teaming: Collaborate with SIRT and Detection Engineering to tune SIEM alerts based on the techniques used during an engagement. <em> Strategic Bug Bounty Management: Oversee the organization&#39;s bug bounty program, identifying trends in submissions to suggest broad architectural security changes.  </em>Required: <em> Experience: 3–5 years in offensive security, penetration testing, or a high-volume bug bounty background and track record of finding high/critical vulnerabilities in complex environments. </em> Concepts: Expert Knowledge and solid understanding of the MITRE ATT&amp;CK matrix and the OWASP Top 10 for web applications and top 10 for LLMs, post exploitation (lateral movement, persistence, data exfiltration) and Adversarial ML. <em> Tooling: Proficient in Burp Suite professional, Nmap, Metasploit, Wireshark etc... and AI security tools such as LangChain, TensorFlow for adversarial testing, as well as use of C2 frameworks (Cobalt Strike, Sliver, Havoc) or similar tools </em> Scripting and Coding: Ability to write functional scripts in Python or Bash to automate repetitive testing tasks and proficiency in Python, C++, and scripting for creating custom offensive tooling that avoids signature-based detection. <em> Certifications: Possession of advanced industry certifications such as OSCP, OSEP, OSWE, GXPN or similar </em> Telecom expertise is preferred</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange>&quot;,   &quot;salaryMin&quot;: &quot;&quot;,   &quot;salaryMax&quot;: &quot;&quot;,   &quot;salaryCurrency&quot;: &quot;USD&quot;,   &quot;salaryPeriod&quot;: &quot;year</Salaryrange>
      <Skills>Burp Suite, Nmap, Metasploit, Wireshark, LangChain, TensorFlow, Cobalt Strike, Sliver, Havoc, Python, Bash, C++, OSCP, OSEP, OSWE, GXPN</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Twilio</Employername>
      <Employerlogo>https://logos.yubhub.co/twilio.com.png</Employerlogo>
      <Employerdescription>Twilio is a cloud communication platform that provides innovative solutions to businesses and empowers developers to craft personalized customer experiences.</Employerdescription>
      <Employerwebsite>https://www.twilio.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/twilio/jobs/7622278</Applyto>
      <Location>Remote - India</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>5d163ac4-a9b</externalid>
      <Title>Staff Engineer, Offensive Security</Title>
      <Description><![CDATA[<p>As a Staff Engineer, Offensive Security at Twilio, you will act as a Technical Lead and design complex attack chains that demonstrate systemic risk. You will spend as much time writing custom code and researching new bypasses as you do executing tests. Key responsibilities include:</p>
<ul>
<li>Full-Stack Penetration Testing: Perform manual and automated testing of web applications, APIs, and mobile apps (iOS/Android).</li>
<li>Internal/External Network Audits: Conduct network and cloud level assessments with various tooling.</li>
<li>Vulnerability Validation: Triage and validate reports from automated scanners or bug bounty hunters to eliminate false positives and escalate true positives.</li>
<li>AI/LLM Probing: Perform initial prompt injection and jailbreak tests on AI prototypes, services, and applications using established checklists (OWASP Top 10 for LLMs).</li>
<li>Technical Reporting: Draft high-quality reports that detail the &#39;path to compromise&#39; with clear, reproducible steps for developers.</li>
<li>Tool Maintenance: Manage and update the team&#39;s testing infrastructure (e.g., Burp Suite, and basic C2 listeners).</li>
<li>Remediation Support: Provide direct technical guidance to engineering teams on how to patch vulnerabilities like XSS, SQLi, and IDOR.</li>
<li>Adversary Emulation: Design and lead multi-week Red Team operations that mimic specific threat actors (APTs) to test the SIRT detection capabilities.</li>
<li>Custom Exploit Development: Build custom payloads, droppers, and obfuscated scripts to bypass EDR/AV and maintain stealth.</li>
<li>AI Red Teaming Architecture: Build automated testing frameworks for AI systems (e.g., using PyRIT, Promptfoo, or Garak) to test for models related to sensitive data leakage.</li>
<li>Cloud &amp; Infrastructure Attacks: Execute sophisticated attacks against AWS/Azure/K8s, focusing on IAM misconfigurations and container escapes.</li>
<li>Purple Teaming: Collaborate with SIRT and Detection Engineering to tune SIEM alerts based on the techniques used during an engagement.</li>
<li>Strategic Bug Bounty Management: Oversee the organization&#39;s bug bounty program, identifying trends in submissions to suggest broad architectural security changes.</li>
</ul>
<p>Requirements:</p>
<ul>
<li>7-10 years of experience in offensive security, penetration testing, a high-volume bug bounty background, AppSec, or vulnerability exploitation, and a track record of finding high/critical vulnerabilities in complex environments using pentesting commercial or custom tools.</li>
<li>Expert knowledge and solid understanding of the MITRE ATT&amp;CK matrix and the OWASP Top 10 for web applications and top 10 for LLMs, post-exploitation (lateral movement, persistence, data exfiltration) and Adversarial ML.</li>
<li>Proficient in OffSec popular tools like Burp Suite professional, Nmap, Metasploit, Wireshark, etc., and AI security tools such as LangChain, TensorFlow for adversarial testing or, as well as use of C2 frameworks (Cobalt Strike, Sliver, Havoc) or similar tools.</li>
<li>Ability to write functional scripts in Python or Bash to automate repetitive testing tasks and proficiency in coding and scripting like Python, C++, and scripting for creating custom offensive exploits that avoid signature-based detection.</li>
<li>Possession of advanced industry certifications such as OSCP, OSEP, OSWE, GXPN or similar training in OffSec tracks is highly desirable.</li>
</ul>
<p>Note: This role will be remote and based in Ireland, with approximately 15% travel anticipated to help connect in-person with customers and colleagues.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Offensive Security, Penetration Testing, Bug Bounty, AppSec, Vulnerability Exploitation, MITRE ATT&amp;CK Matrix, OWASP Top 10, Post-Exploitation, Adversarial ML, Burp Suite, Nmap, Metasploit, Wireshark, LangChain, TensorFlow, C2 Frameworks, Python, Bash, C++</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Twilio</Employername>
      <Employerlogo>https://logos.yubhub.co/twilio.com.png</Employerlogo>
      <Employerdescription>Twilio delivers innovative solutions to hundreds of thousands of businesses and empowers millions of developers worldwide to craft personalized customer experiences.</Employerdescription>
      <Employerwebsite>https://www.twilio.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/twilio/jobs/7622285</Applyto>
      <Location>Remote - Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-25</Postedate>
    </job>
    <job>
      <externalid>1e992e68-7cd</externalid>
      <Title>Staff Engineer, Offensive Security</Title>
      <Description><![CDATA[<p>As a Staff Engineer, Offensive Security at Twilio, you will act as a Technical Lead and design complex attack chains that demonstrate systemic risk. You will spend as much time writing custom code and researching new bypasses as you do executing tests.</p>
<p>In this role, you will:</p>
<p>Perform manual and automated testing of web applications, APIs, and mobile apps (iOS/Android). Conduct network and cloud level assessments with various tooling. Triage and validate reports from automated scanners or bug bounty hunters to eliminate false positives and escalate true positives. Perform initial prompt injection and jailbreak tests on AI prototypes, services, and applications using established checklists (OWASP Top 10 for LLMs). Draft high-quality reports that detail the &quot;path to compromise&quot; with clear, reproducible steps for developers. Manage and update the team&#39;s testing infrastructure (e.g., Burp Suite, and basic C2 listeners). Provide direct technical guidance to engineering teams on how to patch vulnerabilities like XSS, SQLi, and IDOR. Design and lead multi-week Red Team operations that mimic specific threat actors (APTs) to test the SIRT detection capabilities. Build custom payloads, droppers, and obfuscated scripts to bypass EDR/AV and maintain stealth. Build automated testing frameworks for AI systems (e.g., using PyRIT, Promptfoo, or Garak) to test for models related to sensitive data leakage. Execute sophisticated attacks against AWS/Azure/K8s, focusing on IAM misconfigurations and container escapes. Collaborate with SIRT and Detection Engineering to tune SIEM alerts based on the techniques used during an engagement. Oversee the organization&#39;s bug bounty program, identifying trends in submissions to suggest broad architectural security changes.</p>
<p>Twilio values diverse experiences from all kinds of industries, and we encourage everyone who meets the required qualifications to apply.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>staff</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Offensive security, Penetration testing, Bug bounty, AppSec, Vulnerability exploitation, MITRE ATT&amp;CK matrix, OWASP Top 10 for web applications, OWASP Top 10 for LLMs, Post exploitation, Adversarial ML, Burp Suite professional, Nmap, Metasploit, Wireshark, LangChain, TensorFlow, C2 frameworks, Python, Bash, C++, Telecom expertise, Excellent written and verbal communication skills, Ability to influence and build effective working relationships with all levels of the organization, Proficiency in multiple languages applicable to the region</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Twilio</Employername>
      <Employerlogo>https://logos.yubhub.co/twilio.com.png</Employerlogo>
      <Employerdescription>Twilio delivers innovative solutions to hundreds of thousands of businesses and empowers millions of developers worldwide to craft personalized customer experiences.</Employerdescription>
      <Employerwebsite>https://www.twilio.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/twilio/jobs/7622285</Applyto>
      <Location>Remote - Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
  </jobs>
</source>