Offensive Security Engineer
Offensive Security Engineer

Offensive Security Engineer

London Full-Time 43200 - 72000 ÂŁ / year (est.) Home office (partial)
P

At a Glance

  • Tasks: Join us as an Offensive Security Engineer to assess and enhance our cutting-edge software security.
  • Company: Palantir builds world-leading software for data-driven decisions, impacting global challenges.
  • Benefits: Enjoy flexible work options, a supportive community, and opportunities for personal growth.
  • Why this job: Make a real difference by protecting vital information and working with innovative technology.
  • Qualifications: 5+ years in offensive security testing; coding skills in Python, Java, or Go preferred.
  • Other info: Collaborate with diverse teams and enjoy a culture that values creativity and well-being.

The predicted salary is between 43200 - 72000 ÂŁ per year.

A World-Changing Company Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more. The Role Our products support some of the most important and impactful work in the world, including defence, intelligence, and commercial applications. We are trusted by our customers to protect their mission-critical information in the face of advanced persistent threats. Our offensive security engineers emulate these real-world threats and provide critical signal on attack vectors to help improve our security posture. This role will be hands-on and requires a deep understanding of micro-service architecture, multi-tenancy vulnerabilities, cloud security, and web application security. In this role you’ll dive deep into the security of our products and more: • Conduct security assessments. You’ll learn how our products work at the most technical level and then try to break them. This includes everything in our current and future product and service portfolio from Apollo to Foundry. You’ll document security findings and work with AppSec and product engineers to develop mitigations. • Build offensive testing tooling and automation. Scale offensive security testing by developing tooling and automation. Repeatable security testing is ensures that mitigations and controls remain consistent and effective in the face of high velocity development. • Define security metrics. Data is at the heart of Palantir and its important for our security engineers to use data to drive their decisions. As an offensive security engineer you’ll define, report, and use risk metrics to conduct security assessments. • Collaborate with other Palantir security teams. You’ll work with our incident response team to improve detection and response capabilities across our products and infrastructure. There will also be opportunities to work with our Protect team to identify vulnerabilities in our product infrastructure and help define relevant security controls. • Help defend a unique threat environment. Palantir offers an unparalleled opportunity to ply your craft on the bleeding edge of technology, software, and AI. With a wide range of customers and global impact our software is under constant threat from advanced persistent threats (APT). You get to think like an attacker and provide outside-the-box thinking on how to misuse our products. Core Responsibilities Perform offensive security assessments on highly complex products to identify vulnerabilities Perform offensive security assessments within our software supply chain Collaborate with engineering teams on security controls, threat modeling, and security-critical code and architecture. Develop and implement offensive tooling and automation to scale your capabilities and knowledge Operate as an offensive security expert for our products to inform risk assessments during product design Enable other security teams to focus on defending and improving critical areas of our product What We Value Self motivated, experience in solving complex problems Experience performing offensive security testing on software supply chains including CI/CD systems, source control, and dependency based attack vectors Participation in bug bounties, CTFs, vulnerability research, open source tool development, and security presentations Ability to learn and apply new technologies quickly and in complex deployments Experience testing AI related vulnerabilities and architectures. Willingness or eligibility to obtain a UK security clearance What We Require 5+ years of experience performing offensive security testing on web applications, cloud environments, and highly scaled architectures (e.g. SOA or micro-services) Experience testing and exploiting a variety of services and bug types including authentication and authorisation, multi-tenancy, and cloud environment misconfigurations Ability to write code to automate aspects of offensive testing, familiarity with Python, Java, Go are preferred Ability to evaluate code for vulnerabilities and weaknesses Strong communication and collaboration skills, comfortableness working closely with engineering and defensive security teams Life at Palantir We want every Palantirian to achieve their best outcomes, that’s why we celebrate individuals’ strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians’ lives is just one of the ways we’re investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region. In keeping consistent with Palantir’s values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the city and or country in which you are employed. If the posting is specified as Onsite, you are required to work from an office. If you want to empower the world\’s most important institutions, you belong here. Palantir values excellence regardless of background. We are committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process , please reach out and let us know how we can help. #J-18808-Ljbffr

Offensive Security Engineer employer: Palantir

Palantir is an exceptional employer that fosters a culture of innovation and collaboration, empowering its employees to tackle some of the world's most pressing challenges. With a strong focus on personal growth and well-being, Palantir offers unique opportunities for hands-on experience in offensive security, alongside flexible work arrangements that promote creativity and connectivity. Employees are encouraged to leverage their strengths and skills, ensuring a rewarding and meaningful career path in a dynamic environment.
P

Contact Detail:

Palantir Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Offensive Security Engineer

✨Tip Number 1

Familiarise yourself with Palantir's products and services. Understanding how their software operates will give you a significant edge during interviews, as you'll be able to discuss specific security challenges and how your skills can address them.

✨Tip Number 2

Engage in relevant online communities or forums focused on offensive security. Networking with professionals in the field can provide insights into current trends and challenges, which you can leverage in discussions with Palantir's team.

✨Tip Number 3

Showcase your hands-on experience by participating in Capture The Flag (CTF) competitions or contributing to open-source security tools. This practical experience not only enhances your skills but also demonstrates your commitment to the field.

✨Tip Number 4

Prepare to discuss your approach to threat modelling and vulnerability assessment. Be ready to share specific examples from your past work that highlight your problem-solving abilities and technical expertise in offensive security.

We think you need these skills to ace Offensive Security Engineer

Offensive Security Testing
Web Application Security
Cloud Security
Micro-Service Architecture
Multi-Tenancy Vulnerabilities
Security Assessments
Automation of Security Testing
Risk Metrics Definition
Collaboration with Engineering Teams
Threat Modelling
Vulnerability Research
CI/CD Systems Security
Source Control Security
Dependency-Based Attack Vectors
Programming Skills (Python, Java, Go)
Code Evaluation for Vulnerabilities
Strong Communication Skills
Problem-Solving Skills
Experience with AI Vulnerabilities
Participation in Bug Bounties and CTFs

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights relevant experience in offensive security testing, cloud environments, and web application security. Use specific examples that demonstrate your skills in identifying vulnerabilities and conducting security assessments.

Craft a Strong Cover Letter: In your cover letter, express your passion for offensive security and how your background aligns with Palantir's mission. Mention any participation in bug bounties or CTFs, and explain how you can contribute to their security posture.

Showcase Technical Skills: Clearly outline your technical skills, especially in programming languages like Python, Java, or Go. Provide examples of how you've used these skills to automate testing or develop offensive tooling in previous roles.

Highlight Collaboration Experience: Emphasise your ability to work closely with engineering and defensive security teams. Include examples of past collaborations that led to improved security measures or successful project outcomes.

How to prepare for a job interview at Palantir

✨Understand the Role Deeply

Before your interview, make sure you thoroughly understand the responsibilities of an Offensive Security Engineer. Familiarise yourself with micro-service architecture, cloud security, and web application security. This knowledge will help you answer technical questions confidently.

✨Showcase Your Problem-Solving Skills

Be prepared to discuss specific examples where you've solved complex security problems. Highlight any experience with offensive security testing, bug bounties, or vulnerability research. This will demonstrate your hands-on experience and ability to think critically.

✨Prepare for Technical Assessments

Expect to face technical assessments during the interview process. Brush up on your coding skills, particularly in Python, Java, or Go, as well as your ability to evaluate code for vulnerabilities. Practising common security scenarios can also be beneficial.

✨Emphasise Collaboration

Since the role involves working closely with engineering and defensive security teams, be ready to discuss your collaboration experiences. Share examples of how you've worked with others to improve security measures or resolve issues, showcasing your strong communication skills.

Offensive Security Engineer
Palantir
P
Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>