Staff Engineer, Offensive Security

Twilio
Remote - IrelandPosted 3 March 2026

Job Description

<div class="content-intro"><p><strong>Who we are </strong></p> <p>At Twilio, we’re shaping the future of communications, all from the comfort of our homes. We deliver innovative solutions to<a class="c-link" href="https://customers.twilio.com/" target="_blank" data-stringify-link="https://customers.twilio.com/" data-sk="tooltip_parent"> hundreds of thousands of businesses </a>and empower millions of developers worldwide to craft personalized customer experiences.</p> <p>Our dedication to <a class="c-link" href="https://www.twilio.com/en-us/blog/open-work" target="_blank" data-stringify-link="https://www.twilio.com/en-us/blog/open-work" data-sk="tooltip_parent">remote-first work</a>, and strong culture of connection and global inclusion means that no matter your location, you’re part of a vibrant team with diverse experiences making a global impact each day. As we continue to revolutionize how the world interacts, we’re acquiring new skills and experiences that make work feel truly rewarding. Your career at Twilio is in your hands.<br><br>We use Artificial Intelligence (AI) to help make our hiring process efficient. That said, every hiring decision is made by real Twilions!</p> <p><span style="color: rgb(255, 255, 255);">.</span></p></div><p><strong>See yourself at Twilio</strong></p> <p>Join the team as <strong>Staff Engineer, Offensive Security</strong></p> <p><strong>About the job</strong></p> <p>The Staff Engineer acts as a Technical Lead. You don't just find bugs; you design complex attack chains that demonstrate systemic risk. You spend as much time writing custom code and researching new bypasses as you do executing tests.</p> <p><strong>Responsibilities</strong></p> <p>In this role, you will:</p> <ul> <li><strong>Full-Stack Penetration Testing:</strong> Perform manual and automated testing of web applications, APIs, and mobile apps (iOS/Android).</li> <li><strong>Internal/External Network Audits:</strong> Conduct network and cloud level assessments with various tooling</li> <li><strong>Vulnerability Validation:</strong> Triage and validate reports from automated scanners or bug bounty hunters to eliminate false positives and escalate true positives</li> <li><strong>AI/LLM Probing:</strong> Perform initial prompt injection and jailbreak tests on AI prototypes, services, and applications using established checklists (OWASP Top 10 for LLMs).</li> <li><strong>Technical Reporting:</strong> Draft high-quality reports that detail the "path to compromise" with clear, reproducible steps for developers.</li> <li><strong>Tool Maintenance:</strong> Manage and update the team's testing infrastructure (e.g., Burp Suite, and basic C2 listeners).</li> <li><strong>Remediation Support:</strong> Provide direct technical guidance to engineering teams on how to patch vulnerabilities like XSS, SQLi, and IDOR.</li> <li><strong>Adversary Emulation:</strong> Design and lead multi-week Red Team operations that mimic specific threat actors (APTs) to test the SIRT detection capabilities.</li> <li><strong>Custom Exploit Development:</strong> Build custom payloads, droppers, and obfuscated scripts to bypass EDR/AV and maintain stealth.</li> <li><strong>AI Red Teaming Architecture:</strong> Build automated testing frameworks for AI systems (e.g., using PyRIT, Promptfoo, or Garak) to test for models related to sensitive data leakage.</li> <li><strong>Cloud Infrastructure Attacks:</strong> Execute sophisticated attacks against AWS/Azure/K8s, focusing on IAM misconfigurations and container escapes.</li> <li><strong>Purple Teaming:</strong> Collaborate with SIRT and Detection Engineering to tune SIEM alerts based on the techniques used during an engagement.</li> <li><strong>Strategic Bug Bounty Management:</strong> Oversee the organization's bug bounty program, identifying trends in submissions to suggest broad architectural security changes.</li> </ul> <p><strong>Qualifications</strong></p> <p>Twilio values diverse experiences from all kinds of industri ... (truncated, view full listing at source)
Apply Now

Direct link to company career page

Share this job