At a Glance
- Tasks: Join us as an Offensive Security Engineer to assess and enhance our cutting-edge software security.
- Company: Palantir builds transformative software for data-driven decisions, impacting global challenges.
- Benefits: Enjoy flexible work options, a supportive community, and opportunities for personal growth.
- Why this job: Make a real-world impact by defending against advanced threats in a dynamic tech environment.
- Qualifications: 5+ years in offensive security testing; coding skills in Python, Java, or Go preferred.
- Other info: Collaborate with diverse teams and enjoy a culture that values creativity and innovation.
The predicted salary is between 43200 - 72000 ÂŁ per year.
A World-Changing Company. Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.
The Role. Our products support some of the most important and impactful work in the world, including defence, intelligence, and commercial applications. We are trusted by our customers to protect their mission-critical information in the face of advanced persistent threats. Our offensive security engineers emulate these real-world threats and provide critical signal on attack vectors to help improve our security posture. This role will be hands-on and requires a deep understanding of micro-service architecture, multi-tenancy vulnerabilities, cloud security, and web application security.
In this role you’ll dive deep into the security of our products and more:
- Conduct security assessments. You’ll learn how our products work at the most technical level and then try to break them. This includes everything in our current and future product and service portfolio from Apollo to Foundry. You’ll document security findings and work with AppSec and product engineers to develop mitigations.
- Build offensive testing tooling and automation. Scale offensive security testing by developing tooling and automation. Repeatable security testing ensures that mitigations and controls remain consistent and effective in the face of high velocity development.
- Define security metrics. Data is at the heart of Palantir and it's important for our security engineers to use data to drive their decisions. As an offensive security engineer, you’ll define, report, and use risk metrics to conduct security assessments.
- Collaborate with other Palantir security teams. You’ll work with our incident response team to improve detection and response capabilities across our products and infrastructure. There will also be opportunities to work with our Protect team to identify vulnerabilities in our product infrastructure and help define relevant security controls.
- Help defend a unique threat environment. Palantir offers an unparalleled opportunity to ply your craft on the bleeding edge of technology, software, and AI. With a wide range of customers and global impact, our software is under constant threat from advanced persistent threats (APT). You get to think like an attacker and provide outside-the-box thinking on how to misuse our products.
Core Responsibilities:
- Perform offensive security assessments on highly complex products to identify vulnerabilities.
- Perform offensive security assessments within our software supply chain.
- Collaborate with engineering teams on security controls, threat modeling, and security-critical code and architecture.
- Develop and implement offensive tooling and automation to scale your capabilities and knowledge.
- Operate as an offensive security expert for our products to inform risk assessments during product design.
- Enable other security teams to focus on defending and improving critical areas of our product.
What We Value:
- Self-motivated, experience in solving complex problems.
- Experience performing offensive security testing on software supply chains including CI/CD systems, source control, and dependency-based attack vectors.
- Participation in bug bounties, CTFs, vulnerability research, open source tool development, and security presentations.
- Ability to learn and apply new technologies quickly and in complex deployments.
- Experience testing AI related vulnerabilities and architectures.
- Willingness or eligibility to obtain a UK security clearance.
What We Require:
- 5+ years of experience performing offensive security testing on web applications, cloud environments, and highly scaled architectures (e.g. SOA or micro-services).
- Experience testing and exploiting a variety of services and bug types including authentication and authorization, multi-tenancy, and cloud environment misconfigurations.
- Ability to write code to automate aspects of offensive testing; familiarity with Python, Java, Go are preferred.
- Ability to evaluate code for vulnerabilities and weaknesses.
- Strong communication and collaboration skills; comfortableness working closely with engineering and defensive security teams.
Life at Palantir. We want every Palantirian to achieve their best outcomes, that’s why we celebrate individuals’ strengths, skills, and interests, from your first interview to your long-term growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians’ lives is just one of the ways we’re investing in our community.
In keeping consistent with Palantir’s values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the city and or country in which you are employed. If the posting is specified as Onsite, you are required to work from an office.
If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process, please reach out and let us know how we can help.
Offensive Security Engineer employer: Palantir Technologies
Contact Detail:
Palantir Technologies Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Offensive Security Engineer
✨Tip Number 1
Familiarise yourself with Palantir's products and services. Understanding how their software operates at a technical level will give you an edge during interviews, as you'll be able to discuss specific security challenges and how you can address them.
✨Tip Number 2
Engage in relevant online communities and forums related to offensive security. Participating in discussions or sharing your insights can help you build a network and may even lead to referrals or insider tips about the role.
✨Tip Number 3
Showcase your hands-on experience with offensive security tools and techniques. Whether it's through personal projects, contributions to open-source tools, or participation in bug bounties, having tangible examples will demonstrate your skills effectively.
✨Tip Number 4
Prepare for technical interviews by practising common offensive security scenarios. Being able to articulate your thought process when identifying vulnerabilities or developing testing automation will highlight your problem-solving abilities and technical expertise.
We think you need these skills to ace Offensive Security Engineer
Some tips for your application 🫡
Understand the Role: Before applying, make sure you fully understand the responsibilities and requirements of the Offensive Security Engineer position. Familiarise yourself with the key skills mentioned in the job description, such as offensive security testing, cloud security, and collaboration with engineering teams.
Tailor Your CV: Customise your CV to highlight relevant experience and skills that align with the job description. Emphasise your background in offensive security testing, coding abilities, and any participation in bug bounties or vulnerability research. Use specific examples to demonstrate your expertise.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for offensive security and your understanding of Palantir's mission. Mention how your skills can contribute to their goals and provide examples of past experiences that relate to the role. Keep it concise and focused.
Showcase Your Projects: If you have worked on relevant projects, whether personal or professional, include them in your application. Highlight any tools or automation you developed for offensive security testing, and describe the impact of your work. This will demonstrate your hands-on experience and problem-solving abilities.
How to prepare for a job interview at Palantir Technologies
✨Understand the Role Deeply
Before your interview, make sure you thoroughly understand the responsibilities of an Offensive Security Engineer. Familiarise yourself with concepts like micro-service architecture, cloud security, and web application security. This will help you answer questions confidently and demonstrate your expertise.
✨Showcase Your Problem-Solving Skills
Be prepared to discuss specific examples from your past experience where you've solved complex security problems. Highlight any offensive security testing you've performed, especially in software supply chains or CI/CD systems, as this aligns closely with what the company is looking for.
✨Prepare for Technical Questions
Expect technical questions that assess your knowledge of vulnerabilities, attack vectors, and security metrics. Brush up on common vulnerabilities related to authentication, multi-tenancy, and cloud misconfigurations. Being able to articulate your thought process during these discussions will impress your interviewers.
✨Demonstrate Collaboration Skills
Since the role involves working closely with engineering and defensive security teams, be ready to discuss how you've successfully collaborated in the past. Share experiences where you’ve worked with cross-functional teams to improve security measures or develop new tools, showcasing your ability to communicate effectively.