This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page
Job Responsibility:
Conduct offensive security engagements, including Red Team operations, threat-based evaluations, and vulnerability research and exploitation against both internal and external facing systems
Research, develop, and execute adversary tactics, techniques, and procedures (TTPs) across the range of the attack lifecycle
Collaborate with cross-functional teams, including Incident Response, Product Security, and other security partners, to align remediation efforts and drive fixes after testing cycles
Automate portions of assessments, scoping, or other offensive security work to inform and drive our engagements
Requirements:
Requires a Bachelor’s degree (or foreign degree equivalent) in Computer Science, Cybersecurity, or related field
Requires completion of university-level coursework, research project or internship involving the following: High level scripting and coding
Research, develop, and execute adversary tactics, techniques, and procedures (TTPs) across the range of the attack lifecycle
Understanding of the attack lifecycle, and offensive security concepts in Red Team operations
Experience with exploiting common security vulnerabilities and bypassing security controls
Experience in at least one of the following security areas - Network security, Web, desktop and/or mobile application security, source code review, fuzzing and/or analysis, reverse engineering, exploit development and/or vulnerability research