P

Offensive Security Engineer

Perplexity · San Francisco

🔥15 people viewed this job

About the Role

Perplexity is seeking a highly skilled, experienced and hands-on Offensive Security Engineer to join our dynamic security team, taking an adversarial approach to hardening Perplexity's infrastructure, applications, and AI systems. You'll plan and execute red team operations, penetration tests, and attack simulations across our cloud infrastructure, web and mobile applications, AI/ML pipeline, and corporate environment—finding real vulnerabilities before adversaries do and working directly with engineering teams to drive remediation.

Responsibilities

  • Plan and execute red team and purple team engagements simulating advanced threat actors across cloud infrastructure (AWS, Kubernetes), endpoints, and application surfaces

  • Conduct continuous penetration testing of web applications, APIs, mobile clients, browser extensions, cloud infrastructure, and internal services

  • Assess AI/ML-specific attack surfaces including prompt injection, model exfiltration, agent abuse, tool-use exploitation, and MCP security boundaries

  • Develop and maintain custom offensive tooling, exploits, and automation to improve the efficiency and coverage of security testing

  • Perform open-scope adversary simulations that test detection and response capabilities end to end, collaborating closely with the defensive security team

  • Drive threat modeling sessions with engineering teams to identify and prioritize attack vectors in new features and architectures

  • Deliver clear, actionable findings to both technical and executive audiences; partner with engineering to validate remediations

  • Contribute to the security of CI/CD pipelines, supply chain integrity, and secrets management through offensive assessment

  • Stay current on emerging attack techniques, vulnerability research, and adversary tradecraft; bring external perspective into Perplexity's security strategy

Qualifications

  • 5+ years of hands-on experience in offensive security, red teaming, or penetration testing

  • Deep technical expertise in at least two of: cloud security (AWS/GCP/Azure), web/API application security, Kubernetes and container security, macOS/Linux endpoint security, network penetration testing, or CI/CD pipeline security

  • Track record of discovering impactful vulnerabilities or developing novel attack techniques in production environments

  • Strong programming and scripting skills in Python, Go, or similar languages; comfortable writing custom tooling and exploits

  • Experience with industry-standard offensive tools (Burp Suite, Cobalt Strike / Sliver / Mythic, Metasploit, BloodHound, nuclei, etc.) and ability to operate beyond them

  • Excellent written and verbal communication; able to translate complex technical findings into clear risk narratives

  • Experience assessing AI/ML systems, LLM applications, or agentic workflows for security vulnerabilities

  • Bonus: Published security research, conference talks (DEF CON, Black Hat, BSides), CVE credits, or meaningful bug bounty contributions

In information theory, perplexity is a measure of uncertainty for a discrete probability distribution. The perplexity of a fair coin toss is 2, and that of a fair die roll is 6; and generally, for a probability distribution with exactly N outcomes each having a probability of exactly 1 / N, the perplexity is simply N. But perplexity can also be applied to unfair dice, and to other non-uniform probability distributions. It can be defined as the exponentiation of the information entropy. The larger the perplexity, the less likely it is that an observer can guess the value which will be drawn from the distribution.

💬 Developer Questions

Ask the team a question — answers show up here

🎯

What does the interview process look like?

🤖

What AI/vibe coding tools does the team use daily?

👥

How big is the engineering team?

Is the team fully async or are there required meetings?

🚀

What does onboarding look like for remote hires?

🔧

Can you share more about the tech stack and architecture?

📈

What does career growth look like in this role?

📅

What does a typical day look like?

💰

Is there a salary range you can share?

📊

Is equity or stock options part of the package?

🌍

Are there timezone requirements or preferences?

🛂

Do you sponsor work visas?

🏢 Is this your listing? Claim it to answer questions

Similar Jobs

Helpful resources

Hiring for a similar role? Post your job here — it's free →