CrawlJobs Logo

Offensive Security Engineer, Hardware

openai.com Logo

OpenAI

Location Icon

Location:
United States , San Francisco

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

293000.00 - 490000.00 USD / Year

Job Description:

We're seeking an exceptional Principal-level Offensive Security Engineer to challenge and strengthen OpenAI's security posture. This role isn't your typical red team job - it's an opportunity to engage broadly and deeply, craft innovative attack simulations, collaborate closely with defensive teams, and influence strategic security improvements across the organization. You'll have the chance to not only find vulnerabilities but actively drive their resolution, automate offensive techniques with cutting-edge technologies, and use your unique attacker perspective to shape our security strategy. This role will be primarily focused on continuously testing our hardware products and related services.

Job Responsibility:

  • Collaborate proactively with engineering teams to enhance security and mitigate risks in hardware, firmware, and software
  • Perform comprehensive penetration testing on our diverse suite of products
  • Leverage advanced automation and OpenAI technologies to optimize your offensive security work
  • Present insightful, actionable findings clearly and compellingly to inspire impactful change
  • Influence security strategy by providing attacker-driven insights into risk and threat modeling

Requirements:

  • 7+ years of hands-on experience or exceptional accomplishments demonstrating equivalent expertise
  • Exceptional skill in code review, identifying novel and subtle vulnerabilities
  • Demonstrated mastery assessing complex technology stacks
  • Proven ability to reverse engineer bootrom images, firmware, or silicon-level components
  • Deep familiarity with low-level kernel operations, secure boot processes, and hardware-software interactions
  • Hands-on experience building and validating secure boot chains and threat models
  • Proficiency with hardware debugging tools (UART, JTAG, SWD, oscilloscopes, logic analyzers)
  • Solid programming skills in C/C++, Python, or assembly for embedded systems
  • Industry experience securing consumer hardware (e.g., mobile devices, IoT, chipsets)
  • Excellent written and verbal communication skills for technical and non-technical audiences
  • Strong intuitive understanding of trust boundaries and risk assessment in dynamic contexts
  • Excellent coding skills, capable of writing robust tools and automation for offensive operations
  • Ability to communicate complex technical concepts effectively through compelling storytelling
  • Proven track record of not just finding vulnerabilities but actively contributing to solutions in complex codebases

Nice to have:

  • Prior experience working in tech startups or fast-paced technology environments
  • Experience in related disciplines such as Software Engineering (SWE), Detection Engineering, Site Reliability Engineering (SRE), Security Engineering, or IT Infrastructure
What we offer:
  • Medical, dental, and vision insurance for you and your family, with employer contributions to Health Savings Accounts
  • Pre-tax accounts for Health FSA, Dependent Care FSA, and commuter expenses (parking and transit)
  • 401(k) retirement plan with employer match
  • Paid parental leave (up to 24 weeks for birth parents and 20 weeks for non-birthing parents), plus paid medical and caregiver leave (up to 8 weeks)
  • Paid time off: flexible PTO for exempt employees and up to 15 days annually for non-exempt employees
  • 13+ paid company holidays, and multiple paid coordinated company office closures throughout the year for focus and recharge, plus paid sick or safe time (1 hour per 30 hours worked, or more, as required by applicable state or local law)
  • Mental health and wellness support
  • Employer-paid basic life and disability coverage
  • Annual learning and development stipend to fuel your professional growth
  • Daily meals in our offices, and meal delivery credits as eligible
  • Relocation support for eligible employees
  • Additional taxable fringe benefits, such as charitable donation matching and wellness stipends, may also be provided
  • Offers Equity
  • Performance-related bonus(es) for eligible employees

Additional Information:

Job Posted:
February 21, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Offensive Security Engineer, Hardware

Hardware Security Researcher

Internship position in the Donjon team responsible for security of all products ...
Location
Location
France , Paris
Salary
Salary:
1500.00 EUR / Month
https://www.ledger.com Logo
Ledger
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience with programming in Python or Rust
  • Basic understanding of (or strong curiosity towards) semiconductor devices and Integrated Circuits stack up and layout
  • Interest in working in a hands-on, experimental lab environment
  • Ability to formalize your work and shape concepts at the relevant abstraction level
  • Ability to develop and document methods, standards, and guidelines
  • Ability to clearly articulate and communicate your ideas, in written and spoken English
Job Responsibility
Job Responsibility
  • Research cutting-edge offensive security techniques
  • Develop reverse engineering techniques and tools for Integrated Circuits manufactured on modern process nodes
  • Develop attacks for the chips you studied based on reverse engineered information
  • Formalize and generalize the attacks you find, and propose systematic ways to mitigate them or altogether render them impossible
  • Submit your findings for publication in academic journals or specialised conferences if time permits
What we offer
What we offer
  • Social: Frequent social events, snacks and drinks
  • Transportation allowance: commuter allowance to contribute to your preferred means of transportation
  • Lunch vouchers: meal allowance with Swile
  • Vacation: 1 day off for every full month of work, in addition to national holidays
  • Fulltime
Read More
Arrow Right

Principal Consultant - Offensive Security

The Principal Consultant on the Offensive Security team is focused on assessing ...
Location
Location
Japan , Tokyo
Salary
Salary:
Not provided
paloaltonetworks.com Logo
Palo Alto Networks
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6+ years of professional experience leading Red & Purple team engagements, Advanced Attack Simulations, OSINT research, social engineering techniques, bespoke security assessments and exploit development
  • Experience testing a range of technologies (Active Directory, major OSs, cloud environments, IoT / OT) and using a range of security tools and technologies inc AI-enabled to automate and tailor engagements
  • Demonstrate a deep understanding of how malicious software works (i.e.-malware, trojans, rootkits, etc.)
  • Ability to modify known and/or craft custom exploits manually without dependence on consumer tools such as Metasploit
  • Strong knowledge of tools and techniques used to conduct network, wireless, and web application penetration testing
  • Familiarity with web application penetration testing and code auditing to find security gaps and vulnerabilities
  • Experience with penetration testing, administering, and troubleshooting major flavors of Linux, Windows, and major cloud IaaS, PaaS, and SaaS providers (i.e., AWS, GCP, and Azure)
  • Experience with scripting and editing existing code and programming using one or more of the following - Perl, Python, ruby, bash, C/C++, C#, or Java
  • Experience with security assessment tools, including Nessus, OpenVAS, MobSF Metasploit, Burp Suite Pro, Cobalt Strike, Bloodhound, and Empire
  • Knowledge of application, database, and web server design and implementation
Job Responsibility
Job Responsibility
  • Performs client penetration testing to find any vulnerabilities or weaknesses that might be exploited by a malicious party, using open-source, custom, and commercial testing tools - Red Team experience essential
  • Ability to assist in scoping engagements by clearly articulating various penetration approaches and methodologies to audiences ranging from highly technical to executive personnel
  • Report generation that clearly communicates testing and assessment details, results, and remediation recommendations to clients
  • Develop scripts, tools, and methodologies to automate and streamline internal processes and engagements
  • Conducts periodic scans of networks to find and detect vulnerabilities
  • Conducts IT application testing, cybersecurity tool and systems analysis, system and network administration, and systems engineering support for the sustainment of information technology systems (mobile application testing, penetration testing, application, security, and hardware testing)
  • Conduct threat hunting and/or compromise assessment engagements to identify active or dormant indicators of compromise (IoCs) using Crypsis and Palo Alto Networks’ threat hunting tools (and/or client owned hunting instrumentation where applicable)
  • Conduct cloud penetration testing engagements to assess specific workloads (i.e., AWS, GCP, Azure, containers, or other PaaS and SaaS instances) for vulnerabilities and subsequently attempt to exploit identified weakness after receiving permission from client stakeholders
  • Provide recommendations to clients on specific security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks including response and recovery of a data security breach
  • Ability to perform travel requirements as needed to meet business demands
  • Fulltime
Read More
Arrow Right

Senior Consultant - Offensive Security

The Senior Consultant on the Offensive Security team is focused on assessing and...
Location
Location
Japan
Salary
Salary:
Not provided
paloaltonetworks.com Logo
Palo Alto Networks
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of professional experience with risk assessment tools, technologies, and methods focused on Information Assurance, Information Systems/Network Security, Infrastructure Design, and Vulnerabilities Assessments
  • Demonstrate a deep understanding of how malicious software works (i.e.-malware, trojans, rootkits, etc.)
  • Ability to modify known and/or craft custom exploits manually without dependence on consumer tools such as Metasploit
  • Knowledge of tools and techniques used to conduct network, wireless, and web application penetration testing
  • Familiarity with web application penetration testing and code auditing to find security gaps and vulnerabilities
  • Knowledge and experience in conducting cyber risk assessments using industry standards
  • Experience with penetration testing, administering, and troubleshooting major flavors of Linux, Windows, and major cloud IaaS, PaaS, and SaaS providers (i.e., AWS, GCP, and Azure)
  • Experience with security assessment tools
  • Knowledge of network vulnerability assessments, web and cloud application security testing, network penetration testing, red teaming, security operations, or 'hunt'
  • Knowledge of computer forensic tools, technologies, and methods
Job Responsibility
Job Responsibility
  • Conducts periodic scans of networks to find and detect vulnerabilities
  • Performs client penetration testing to find any vulnerabilities or weaknesses that might be exploited by a malicious party, using open-source, custom, and commercial testing tools
  • Ability to assist in scoping engagements by clearly articulating various penetration approaches and methodologies to audiences ranging from highly technical to executive personnel
  • Report generation that clearly communicates testing and assessment details, results, and remediation recommendations to clients
  • Develop scripts, tools, and methodologies to automate and streamline internal processes and engagements
  • Conducts IT application testing, cybersecurity tool and systems analysis, system and network administration, and systems engineering support for the sustainment of information technology systems (mobile application testing, penetration testing, application, security, and hardware testing)
  • Conduct threat hunting and/or compromise assessment engagements to identify active or dormant indicators of compromise (IoCs) using Crypsis and Palo Alto Networks’ threat hunting tools (and/or client owned hunting instrumentation where applicable)
  • Conduct cloud penetration testing engagements to assess specific workloads (i.e., AWS, GCP, Azure, containers, or other PaaS and SaaS instances) for vulnerabilities and subsequently attempt to exploit identified weakness after receiving permission from client stakeholders
  • Provide recommendations to clients on specific security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks including response and recovery of a data security breach
  • Ability to perform travel requirements as needed to meet business demands
What we offer
What we offer
  • FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees
  • mental and financial health resources
  • personalized learning opportunities
  • Fulltime
Read More
Arrow Right

Offensive Cyber Engineer

At Cryptic Vector, we are dedicated to mission success. We take the time to unde...
Location
Location
United States , Miamisburg
Salary
Salary:
Not provided
crypticvector.com Logo
Cryptic Vector
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering, or a related field
  • Strong programming skills in C, Assembly, and Python
  • Extensive experience with reverse engineering tools such as Ghidra, IDA Pro, and Wireshark
  • Proficiency with x86 architecture, or other modern architecture, and Hex editors
  • Ability to interface with hardware, including connecting probes to traces, using logic analyzers, and decoding hardware signals
  • Strong problem-solving skills and the ability to think critically and creatively in analyzing software and hardware components
  • Meticulous attention to detail, especially when dealing with complex codebases and hardware systems
  • Priority will be given to candidates with an active Top Secret (TS) clearance
Job Responsibility
Job Responsibility
  • Reverse Engineering (RE) of software/firmware, Vulnerability Research (VR), exploit development/productization
  • Deconstruct and analyze software/firmware to understand its structure, functionality, and behavior
  • Design/develop post-exploitation effects in software/firmware, which can withstand scrutiny and attack
  • Design/develop secure, reliable, software-based communication solutions
  • Design/develop stealth solutions
  • Employ industry-standard tools such as Ghidra, IDA Pro, Wireshark, and Hex editors (e.g., Hex Workshop) to reverse engineer software components
  • Develop scripts and tools in C, Assembly, Rust, and Python to automate and enhance reverse engineering processes
  • Collaborate with hardware teams to understand and interact with physical devices. This includes connecting probes, using logic analyzers, and decoding signals on hardware
  • Write unit tests, functional tests, and end-to-end tests
  • Prepare detailed reports documenting the findings, methodologies, and potential implications of reverse engineering efforts
What we offer
What we offer
  • 100% Company-paid medical insurance for employees
  • 100% Company-paid dental and vision insurance
  • Competitive salary and bonus
  • 25% 401k company contribution
  • Generous PTO, parental leave, bereavement leave, and volunteer time
  • Flexible work hours
  • Tuition reimbursement, training allowance, internal mobility opportunities
  • Free beverages and snacks, Donut Fridays, monthly social events
Read More
Arrow Right

Offensive Cyber Engineer

As an Offensive Cyber Engineer, you’ll dive deep into reverse engineering and vu...
Location
Location
United States , Atlanta
Salary
Salary:
Not provided
crypticvector.com Logo
Cryptic Vector
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering, or a related field
  • Strong programming skills in C, Assembly, and Python
  • Extensive experience with reverse engineering tools such as Ghidra, IDA Pro, and Wireshark
  • Proficiency with x86 architecture, or other modern architecture, and Hex editors
  • Ability to interface with hardware, including connecting probes to traces, using logic analyzers, and decoding hardware signals
  • Strong problem-solving skills and the ability to think critically and creatively in analyzing software and hardware components
  • Meticulous attention to detail, especially when dealing with complex codebases and hardware systems
  • Priority will be given to candidates with an active Top Secret (TS) clearance
Job Responsibility
Job Responsibility
  • Reverse Engineering (RE) of software/firmware, Vulnerability Research (VR), exploit development/productization
  • Deconstruct and analyze software/firmware to understand its structure, functionality, and behavior
  • Design/develop post-exploitation effects in software/firmware, which can withstand scrutiny and attack
  • Design/develop secure, reliable, software-based communication solutions
  • Design/develop stealth solutions
  • Employ industry-standard tools such as Ghidra, IDA Pro, Wireshark, and Hex editors (e.g., Hex Workshop) to reverse engineer software components
  • Develop scripts and tools in C, Assembly, Rust, and Python to automate and enhance reverse engineering processes
  • Collaborate with hardware teams to understand and interact with physical devices. This includes connecting probes, using logic analyzers, and decoding signals on hardware
  • Write unit tests, functional tests, and end-to-end tests
  • Prepare detailed reports documenting the findings, methodologies, and potential implications of reverse engineering efforts
What we offer
What we offer
  • 100% Company-paid medical insurance for employees
  • 100% Company-paid dental and vision insurance
  • Competitive salary and bonus
  • 25% 401k company contribution
  • Generous PTO, parental leave, bereavement leave, and volunteer time
  • Flexible work hours
  • Tuition reimbursement, training allowance, internal mobility opportunities
  • Free beverages and snacks, Donut Fridays, monthly social events
Read More
Arrow Right

Offensive Cyber Engineer

As an Offensive Cyber Engineer, you’ll dive deep into reverse engineering and vu...
Location
Location
United States , Liberty Township
Salary
Salary:
Not provided
crypticvector.com Logo
Cryptic Vector
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering, or a related field
  • Strong programming skills in C, Assembly, and Python
  • Extensive experience with reverse engineering tools such as Ghidra, IDA Pro, and Wireshark
  • Proficiency with x86 architecture, or other modern architecture, and Hex editors
  • Ability to interface with hardware, including connecting probes to traces, using logic analyzers, and decoding hardware signals
  • Strong problem-solving skills and the ability to think critically and creatively in analyzing software and hardware components
  • Meticulous attention to detail, especially when dealing with complex codebases and hardware systems
  • Priority will be given to candidates with an active Top Secret (TS) clearance
  • This role requires use of technical data subject to U.S. Government contract restrictions, therefore this posting is only for U.S. Citizens
Job Responsibility
Job Responsibility
  • Reverse Engineering (RE) of software/firmware, Vulnerability Research (VR), exploit development/productization
  • Deconstruct and analyze software/firmware to understand its structure, functionality, and behavior
  • Design/develop post-exploitation effects in software/firmware, which can withstand scrutiny and attack
  • Design/develop secure, reliable, software-based communication solutions
  • Design/develop stealth solutions
  • Employ industry-standard tools such as Ghidra, IDA Pro, Wireshark, and Hex editors (e.g., Hex Workshop) to reverse engineer software components
  • Develop scripts and tools in C, Assembly, Rust, and Python to automate and enhance reverse engineering processes
  • Collaborate with hardware teams to understand and interact with physical devices. This includes connecting probes, using logic analyzers, and decoding signals on hardware
  • Write unit tests, functional tests, and end-to-end tests
  • Prepare detailed reports documenting the findings, methodologies, and potential implications of reverse engineering efforts
What we offer
What we offer
  • 100% Company-paid medical insurance for employees
  • 100% Company-paid dental and vision insurance
  • Competitive salary and bonus
  • 25% 401k company contribution
  • Generous PTO, parental leave, bereavement leave, and volunteer time
  • Flexible work hours
  • Tuition reimbursement, training allowance, internal mobility opportunities
  • Free beverages and snacks, Donut Fridays, monthly social events
Read More
Arrow Right

Systems Resilience Engineer, Lead

Utilize your technical expertise in support of cyberspace operations. Build your...
Location
Location
United States , Fort Meade
Salary
Salary:
99000.00 - 225000.00 USD / Year
boozallen.com Logo
Booz Allen Hamilton
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience designing, implementing, and maintaining Linux environments with Ansible products
  • 5+ years of experience building and maintaining virtual environments using VMware
  • 2+ years of experience maintaining Layer 2 and Layer 3 networking devices
  • Experience supporting national cyber missions in offensive or defensive capacities, including USCC or the service cyber components
  • Ability to be flexible for shift work
  • TS/SCI clearance with a polygraph
  • Bachelor’s degree and 8+ years of experience within the cyber field, Master’s degree and 5+ years of experience within the cyber field, or 15+ years of experience within the cyber field in lieu of a degree
  • DoD 8570 IAT Level II Certification, including Security+ CE Certification
Job Responsibility
Job Responsibility
  • Utilize your technical expertise in support of cyberspace operations
  • Build your expertise and solve technical problems in a fast-paced, agile environment
  • Develop, implement, and maintain customer-focused database solutions in support of our warfighters
  • Participate in development, testing, and delivery of software products or components to maintain existing systems
  • Provide shift work for software or hardware support at government data centers
  • Serve as a member of an Agile software development team
  • Apply leading-edge principles, theories, and concepts and contribute to the development of new principles and concepts
  • Work on unusually complex problems and provide highly innovative solutions
  • Operate with substantial latitude for unreviewed action or decision
  • Mentor or supervise employees in both company and technical competencies
What we offer
What we offer
  • Health, life, disability, financial, and retirement benefits
  • Paid leave
  • Professional development
  • Tuition assistance
  • Work-life programs
  • Dependent care
  • Recognition awards program
Read More
Arrow Right
New

Project Controls Coordinator III

Under the direction of the Supervisor Project Controls, the Analyst will perform...
Location
Location
Canada , North York
Salary
Salary:
55.00 - 58.00 CAD / Hour
https://www.randstad.com Logo
Randstad
Expiration Date
June 03, 2026
Flip Icon
Requirements
Requirements
  • Four Year Degree or combination of education and related experience
  • Minimum of 5 years of Project Controls or Project Management experience
  • Project Management professional designation is preferred
  • Experienced analytical skills including Earned Value Management
  • An independent worker within a team setting
  • Demonstrated professional engagement at a high level with work group, stakeholders, and contractors in a team setting
  • Proficient in the use of SAP, Oracle and MS office suite, intermediate+ Excel skills
  • Excellent communication, interpersonal, and organizational skills
  • Ability to effectively manage and prioritize workload, bring issues forward and develop working relationships at all levels of the organization
  • Detail oriented and understands the importance of data reconciliation
Job Responsibility
Job Responsibility
  • Analyze and maintain the project costs at the WBS level including control budget, incurred costs, commitments, and forecast
  • Provide the project team with accurate and timely cost information and reporting
  • Perform earned value measurements to anticipate forecast impacts
  • Perform monthly project close processes and prepare monthly project reports and comparative capital cost estimates for the project in Excel and EcoSys
  • Prepare and document project change orders timely in accordance with Project Management Office standards
  • Engage the Project Managers in meetings and discussions to review and reforecast project costs
  • Review cost transactions to ensure accurate project costs
  • Communicate with larger Controls team for the project
  • Liaise with Project Managers and Field Cost Analysts to ensure engagement with the project progress, changes, highlights and issues
  • Maintain the project Work Breakdown Structure such that it facilitates project execution and cost control during project execution and meets accounting requirements for asset creation and project closeout
  • Fulltime
Read More
Arrow Right