This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As an Offensive Security Engineer, you help protect Mollie’s platform and the businesses that depend on it by thinking like an attacker—then working like a partner. You’ll proactively identify and validate vulnerabilities across our products and infrastructure, and collaborate closely with Product Engineering, Security Engineering, and Security Operations to drive issues from discovery all the way through fix verification and closure. Your work helps us ship quickly without compromising on security, resilience, or customer trust.
Job Responsibility:
Plan and execute security assessments across web applications, APIs, cloud services, and internal systems—focused on realistic attack paths and business impact
Confirm exploitability, reduce false positives, and help teams understand severity and remediation options
Partner with SecOps and Security Engineering to run collaborative exercises (e.g., detection validation, incident simulations, phishing/crisis scenarios) that strengthen real-world readiness
Improve playbooks, testing approaches, and automation to scale offensive security across teams and technologies
Partner closely with engineering teams to answer questions, support fixes, retest, and uplift secure development practices—while also contributing to security awareness initiatives across the organization
Requirements:
2+ years of hands-on offensive security experience (penetration testing, ethical hacking, product security engineering)
Certifications such as OSCP, OSCE, or similar are highly preferred
Practical experience testing modern web applications and APIs (auth, authorization, business logic, data handling)
Familiarity with common testing tools and techniques (e.g., Burp Suite and similar tooling)
Basic scripting/automation skills (Python, Bash, or similar) to speed up repeatable work
Understanding of cloud environments and common attack vectors (GCP concepts are all welcome)
Ability to write clear, actionable findings and communicate risk to both technical and non-technical stakeholders
A collaborative mindset: you enjoy partnering with teams to get issues fixed and verified