You are viewing a preview of this job. Log in or register to view more details about this job.

Internship - Offensive Security Engineer

Who We Are Looking For

We are looking for an Offensive Security Engineer who operates with clear ownership. You’re not just filling a seat. You’re setting the standard. You believe great execution brings strategy to life.

How You Operate

You bring mission-driven grit to every challenge, running toward hard problems rather than away from it. You prioritize customer outcomes over internal processes and choose truth and clarity over performative politeness. We look for builders with a bias for action—people who own the fix when things break, share credit with the team, and possess the intellectual humility to care more about getting to the right answer than being right.

What You Will Own

  • Own the Outcome: Execute challenging security projects for our PS and MSP customers, ensuring technical precision and successfully resolving complex client needs.
  • Take Accountability: Be accountable for the success of unique engagements by developing custom methodologies, payloads, exploits, and tools when off-the-shelf solutions aren't enough.
  • Raise the Bar: Continuously improve the bridge between services and product by identifying vulnerability trends in the field and translating them into tangible improvements.
  • Drive Impact: Proactively develop new Chariot capabilities based on the specific security vulnerabilities identified during PS security projects.
  • Scale Expertise: Aggressively learn as much as possible about the industry and offensive security landscape to ensure the team remains on the bleeding edge of tradecraft.

What You Bring

  • The Foundation: A Bachelor’s degree in Computer Science, Engineering, Mathematics, or Physics, backed by 0–2 years of experience or relevant internships in cybersecurity, startups, or high-tech environments.
  • Technical Fluency: You have experience writing software or scripts using common offensive security languages, specifically Go (Golang), Python, PowerShell, or Bash.
  • Domain Expertise: You have early experience or a demonstrated passion for Product Security (App/Mobile/LLM), Cloud Security (AWS/Azure/GCP), Web/Network Penetration Testing, Red Teaming, or IoT/Embedded Security.
  • Offensive Security Mindset: You don't just work 9-to-5; you compete. You have notable achievements in CTFs (CCDC, CPTC) or on testing platforms like Hack The Box, TryHackMe, or PortSwigger.
  • The "Plus One" Edge: You go beyond the basics with verifiable contributions to vulnerability research (CVEs), exploit development, or open-source offsec projects. Familiarity with AI prompt engineering for tool/payload generation is a strong plus.

Ready to raise the bar? Apply today. 

Praetorian is not sponsoring employment visas for this position at this time. Candidates must be currently authorized to work in the United States on a full-time basis.