Offensive Security Engineer

Offensive Security Engineer

Full-Time 60000 - 80000 € / year (est.) No home office possible
TryHackMe

At a Glance

  • Tasks: Shape AI-powered pentesting solutions and validate real vulnerabilities.
  • Company: Join NoScope, a cutting-edge venture backed by TryHackMe.
  • Benefits: Competitive salary, fully remote work, and high autonomy.
  • Other info: Fast-paced environment with opportunities for growth and ownership.
  • Why this job: Be at the forefront of AI in cybersecurity and make a real impact.
  • Qualifications: 3-5+ years in offensive security with strong coding skills.

The predicted salary is between 60000 - 80000 € per year.

About NoScope

NoScope is a new venture from the team behind TryHackMe, the world’s largest cyber security training platform used by 7M+ users and thousands of businesses. We’re building an AI‑powered pentesting solution. Attackers already use AI to launch hundreds of thousands of attacks in minutes, and traditional pentesting has not kept up— it remains manual, expensive, and time‑limited, allowing many applications to go untested and real vulnerabilities to slip through. NoScope solves this with a swarm of AI agents that ethically test applications, chaining actions across pages and workflows to find and validate real vulnerabilities with clear evidence. With TryHackMe’s backing, deep offensive security expertise, and access to large‑scale training environments, we’re building a fundamentally better solution for pentesting.

The Role

You will work closely with the core agentic system and help shape how it performs in real environments. This role requires thinking like an attacker, challenging assumptions, and ensuring that what we identify is genuinely exploitable and meaningful. You will be involved in hands‑on testing, improving how the system approaches testing, and maintaining a high bar for the quality of findings. The role also focuses on content creation: clear and detailed blogs, technical writeups, and breakdowns of vulnerabilities discovered by the agent, explaining real‑world impact, exploitability, and remediation.

What you’ll do

  • Work directly with the AI agent system, run it against targets, understand where it performs well and where it falls short, and provide structured feedback to improve coverage and accuracy.
  • Validate, reproduce, and elevate findings, writing clear and reliable proof‑of‑concepts that demonstrate real‑world exploitability.
  • Coordinate disclosures across OSS projects and bug‑bounty platforms, managing timelines and communication effectively.
  • Contribute to public security research and technical content that is relevant and valuable to the security community.
  • Research emerging vulnerability classes and attack techniques, and translate those insights into improvements in how the system tests.
  • Build and maintain custom tooling where needed, including automation scripts, payload lists, and testing harnesses tailored to specific targets.

What we’re looking for

  • 3–5+ years of professional offensive security experience in penetration testing, bug bounty, or red teaming.
  • Strong understanding of web application vulnerabilities such as SQLi, XSS, SSRF, IDOR, SSTI, business‑logic flaws, authentication bypasses, and their real‑world nuances.
  • Comfortable reading and writing code in Python, Bash, and JavaScript, with the ability to build custom tooling when needed.
  • Experience with public disclosures or CVEs.
  • Clear and effective written communication, with the ability to explain complex findings to both engineers and security teams.
  • Experience working with bug‑bounty platforms and responsible disclosure processes.
  • Ability to go beyond automated tools and reason about systems, attack paths, and edge cases.

Bonus points

  • Public bug‑bounty reports or an active HackerOne or Bugcrowd profile.
  • Experience with TryHackMe or familiarity with its community.
  • Exposure to AI‑assisted security tooling.

Why NoScope

  • AI is fundamentally changing how the world finds and fixes vulnerabilities— you’ll be working on systems that represent where the field is going, not where it is today.
  • Backed by TryHackMe, with funding, distribution, and full support from founders who built a $30M+ ARR cybersecurity company.
  • Access to a 7M+ user network and real‑world environments that help validate findings at scale.
  • Be an early hire with real ownership over testing quality, exploitability standards, and how results are validated.
  • Work with a strong, focused team building at the intersection of AI and offensive security.
  • Competitive salary.
  • Fully remote— work from anywhere with a global team.
  • High trust and autonomy from day one.

Please note that we are currently unable to provide sponsorship.

How We Work

We operate with intensity. You’ll move fast, wear multiple hats, and get involved in things outside your job title. There’s no playbook, no hand‑holding, and no coasting. If you’re looking for a standard 9‑5 with clear lanes, this isn’t the right fit. If you want an environment built to win where your work genuinely matters, you’ll thrive here.

Offensive Security Engineer employer: TryHackMe

At NoScope, we pride ourselves on being an innovative employer that empowers our team to shape the future of offensive security through AI-driven solutions. With a fully remote work culture, we offer high trust and autonomy, allowing you to take ownership of your projects while collaborating with a passionate team. Our commitment to employee growth is evident in our support for public security research and technical content creation, ensuring that your contributions have a meaningful impact in the cybersecurity community.

TryHackMe

Contact Detail:

TryHackMe Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Offensive Security Engineer

Tip Number 1

Network like a pro! Get involved in online communities, attend meetups, and connect with folks in the offensive security space. You never know who might have a lead on your dream job!

Tip Number 2

Show off your skills! Create a portfolio of your work, including any public bug-bounty reports or write-ups. This not only demonstrates your expertise but also gives potential employers a taste of what you can do.

Tip Number 3

Don’t just apply—engage! When you find a role that excites you, reach out to current employees on LinkedIn. Ask them about their experiences and share your enthusiasm for the position. It’s a great way to stand out!

Tip Number 4

Keep learning and adapting! The field of offensive security is always evolving, so stay updated on the latest trends and tools. Consider taking courses or certifications that align with the job you're after, especially those related to AI in security.

We think you need these skills to ace Offensive Security Engineer

Offensive Security
Penetration Testing
Bug Bounty
Red Teaming
Web Application Vulnerabilities
SQL Injection (SQLi)
Cross-Site Scripting (XSS)

Some tips for your application 🫡

Show Your Passion for Security:When writing your application, let us see your enthusiasm for offensive security! Share your experiences and what drives you in this field. We love to see candidates who are genuinely excited about tackling vulnerabilities and improving security.

Be Clear and Concise:We appreciate clear communication, especially when it comes to complex topics. Make sure your application is well-structured and easy to read. Use bullet points if necessary to highlight your skills and experiences that align with the role.

Tailor Your Application:Don’t just send a generic application! Take the time to tailor your CV and cover letter to reflect the specific requirements of the Offensive Security Engineer role. Highlight relevant experiences and skills that match what we’re looking for.

Apply Through Our Website:We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows us you’re serious about joining our team!

How to prepare for a job interview at TryHackMe

Know Your Vulnerabilities

Make sure you brush up on web application vulnerabilities like SQLi, XSS, and others mentioned in the job description. Be ready to discuss real-world examples and how they can be exploited. This shows you not only understand the theory but can also think like an attacker.

Show Off Your Coding Skills

Since coding is a big part of this role, practice writing scripts in Python, Bash, and JavaScript. Bring examples of custom tooling you've built or worked on. Being able to demonstrate your coding prowess will set you apart from other candidates.

Communicate Clearly

Prepare to explain complex security findings in simple terms. You might be asked to break down a vulnerability or a proof-of-concept during the interview. Practising this skill will help you convey your thoughts effectively to both technical and non-technical audiences.

Research and Engage

Familiarise yourself with NoScope's mission and the AI-assisted security landscape. If you have public bug-bounty reports or an active profile on platforms like HackerOne, bring that up! Showing your engagement with the community can really impress the interviewers.