87 remote roles added today376 active tech employersπŸ‡ΊπŸ‡Έ πŸ‡¨πŸ‡¦ πŸ‡²πŸ‡½ Tri-border network749 metros covered12 database updates this hourTN visa filter live87 remote roles added today376 active tech employersπŸ‡ΊπŸ‡Έ πŸ‡¨πŸ‡¦ πŸ‡²πŸ‡½ Tri-border network749 metros covered12 database updates this hourTN visa filter live
Jobs/San Francisco/Member Of Technical Staff (Offensive Security Engineer)
San Francisco, CA

Member Of Technical Staff (Offensive Security Engineer)

Perplexity is seeking a highly skilled, experienced and hands-on Offensive Security Engineer to join our dynamic security team, taking an adversarial approach to hardening Perplexity's infrastructure, applications, and AI systems. You'll plan and execute red team operations, penetration tests, and attack simulations ac

Company
Perplexity
Compensation
$220K - $405K
Schedule
Full-Time
Role overview

What this role actually needs.

Perplexity is seeking a highly skilled, experienced and hands-on Offensive Security Engineer to join our dynamic security team, taking an adversarial approach to hardening Perplexity's infrastructure, applications, and AI systems. You'll plan and execute red team operations, penetration tests, and attack simulations ac Responsibilities: - Plan and execute red team and purple team engagements simulating advanced threat actors across cloud infrastructure (AWS, Kubernetes), endpoints, and application surfaces - Conduct continuous penetration testing of web applications, APIs, mobile clients, browser extensions, cloud infrastructure, and internal services - Assess AI/ML-specific attack surfaces including prompt injection, model exfiltration, agent abuse, tool-use exploitation, and MCP security boundaries - Develop and maintain custom offensive tooling, exploits, and automation to improve the efficiency and coverage of security testing - Perform open-scope adversary simulations that test detection and response capabilities end to end, collaborating closely with the defensive security team - Drive threat modeling sessions with engineering teams to identify and prioritize attack vectors in new features and architectures Requirements: - 5+ years of hands-on experience in offensive security, red teaming, or penetration testing - Deep technical expertise in at least two of: cloud security (AWS/GCP/Azure), web/API application security, Kubernetes and container security, macOS/Linux endpoint security, network penetration testing, or CI/CD pipeline security - Track record of discovering impactful vulnerabilities or developing novel attack techniques in production environments - Strong programming and scripting skills in Python, Go, or similar languages; comfortable writing custom tooling and exploits - Experience with industry-standard offensive tools (Burp Suite, Cobalt Strike / Sliver / Mythic, Metasploit, BloodHound, nuclei, etc.) and ability to operate beyond them - Excellent written and verbal communication; able to translate complex technical findings into clear risk narratives Company context: Perplexity is an answer engine β€” an AI-native search product used by millions of professionals daily.

Responsibilities

Day-to-day expectations

Perplexity lists these responsibilities for the Member Of Technical Staff (Offensive Security Engineer) role.

  • Plan and execute red team and purple team engagements simulating advanced threat actors across cloud infrastructure (AWS, Kubernetes), endpoints, and application surfaces
  • Conduct continuous penetration testing of web applications, APIs, mobile clients, browser extensions, cloud infrastructure, and internal services
  • Assess AI/ML-specific attack surfaces including prompt injection, model exfiltration, agent abuse, tool-use exploitation, and MCP security boundaries
  • Develop and maintain custom offensive tooling, exploits, and automation to improve the efficiency and coverage of security testing
  • Perform open-scope adversary simulations that test detection and response capabilities end to end, collaborating closely with the defensive security team
  • Drive threat modeling sessions with engineering teams to identify and prioritize attack vectors in new features and architectures
Requirements

What a strong candidate brings

These requirements are extracted from the source listing and normalized for UpJobz readers.

  • 5+ years of hands-on experience in offensive security, red teaming, or penetration testing
  • Deep technical expertise in at least two of: cloud security (AWS/GCP/Azure), web/API application security, Kubernetes and container security, macOS/Linux endpoint security, network penetration testing, or CI/CD pipeline security
  • Track record of discovering impactful vulnerabilities or developing novel attack techniques in production environments
  • Strong programming and scripting skills in Python, Go, or similar languages; comfortable writing custom tooling and exploits
  • Experience with industry-standard offensive tools (Burp Suite, Cobalt Strike / Sliver / Mythic, Metasploit, BloodHound, nuclei, etc.) and ability to operate beyond them
  • Excellent written and verbal communication; able to translate complex technical findings into clear risk narratives
UpJobz market context

Why this listing is more than a copied job post.

Member Of Technical Staff (Offensive Security Engineer) is framed against UpJobz source checks, country scope, compensation visibility, and work-authorization signals so candidates can make a faster go/no-go decision.

United States tech market

United States roles on UpJobz are filtered for high-tech relevance, source freshness, and actionable employer detail before they are allowed into SEO surfaces.

Compensation read

$220K - $405K is visible before the click, so candidates can compare the role against local market expectations before applying.

Work authorization read

Current extracted signal: Open to TN, H-1B, and OPT candidates already in the United States. UpJobz treats this as a search signal, not legal advice, and links visa-sensitive roles back to the relevant visa hub where possible.

Location read

Hybrid roles in San Francisco should be compared against commute, local salary bands, and nearby employer demand.

Browse similar jobs

Subscriber playbook

Turn this listing into an application plan.

This is the first pass at the premium UpJobz layer: a fast brief that helps serious applicants move with more clarity.

Next moves

  • Tailor your resume around ai and llm instead of sending a generic application.
  • Use the first two bullets of your application to connect your background directly to member of technical staff (offensive security engineer) is a high-signal hybrid role in san francisco, and it is most realistic for open to tn, h-1b, and opt candidates already in the united states.
  • Open the role quickly if it fits and bookmark three similar jobs before you leave the page.

Interview themes

CybersecurityHybridaillmmachine-learningresearch

Watchouts

  • $220K - $405K is visible, so calibrate your application around the posted range.
  • Use open to tn, h-1b, and opt candidates already in the united states as part of your positioning so the recruiter does not have to infer it.
  • Show concrete examples of succeeding in hybrid environments.
Role signals

Keywords to match against your background

Use these terms to decide whether your resume, portfolio, and recent projects line up with the role.

aillmmachine-learningresearchpythonkubernetesawsgcpazuresecurityuxapisearchinfrastructureproduct
Next step

Apply through the employer source

Open the source listing from jobs.ashbyhq.com, confirm the role is still active, then apply on the employer or ATS page.

Open employer application

Source: jobs.ashbyhq.com Β· Source ID: 69fd6a56-0050-44f7-9ed2-2c3a7320908d Β· Confidence: 94/100 Β· Last checked: May 7, 2026

How UpJobz verifies job sourcesContinue browsing tech jobs