CoreWeave logo

Offensive Security Engineer

Verified
CoreWeave
Posted 1 weeks ago
Posted 20 April 2026
1 views
full-time

About the Role

<div class="content-intro"><div> <div> <div class="gmail_quote"> <div> <div><span id="m_1770241969069985273m_-2746164444908759431gmail-docs-internal-guid-131e4fb0-7fff-b4e9-ff50-e8cf32449b1b">CoreWeave is The Essential Cloud for AI™. Built for pioneers by pioneers, CoreWeave delivers a platform of technology, tools, and teams that enables innovators to build and scale AI with confidence. Trusted by leading AI labs, startups, and global enterprises, CoreWeave combines superior infrastructure performance with deep technical expertise to accelerate breakthroughs and turn compute into capability. Founded in 2017, CoreWeave became a publicly traded company (Nasdaq: CRWV) in March 2025. Learn more at&nbsp;<a href="http://www.coreweave.com/" target="_blank" data-saferedirecturl="https://www.google.com/url?q=http://www.coreweave.com&amp;amp;source=gmail&amp;amp;ust=1762613132717000&amp;amp;usg=AOvVaw3D-UOhNaqEvF5BEWxjYyAU&quot;&gt;www.coreweave.com&lt;/a&gt;.&lt;/span&gt;&lt;/div> </div> </div> </div> </div></div><h4 data-section-id="1loqd1g" data-start="90" data-end="110">What You’ll Do:</h4> <p data-start="111" data-end="474">CoreWeave’s Information Security team ensures that both internal and external systems are secure, resilient, and compliant. Our team partners with engineering and product teams to identify vulnerabilities, harden systems, and maintain a high standard of security across all infrastructure and applications that deliver high-performance compute to our customers.</p> <p data-start="476" data-end="958"><strong data-start="476" data-end="495">About the role:<br></strong><br data-start="495" data-end="498">As an Offensive Security Engineer at CoreWeave, you will lead efforts to identify and mitigate security risks across internal and external systems. You’ll perform penetration testing, conduct threat modeling, and provide guidance to engineering teams on secure design and best practices. This role also involves developing security tooling, researching emerging threats, and contributing to the continuous improvement of CoreWeave’s overall security posture.</p> <p data-start="960" data-end="990">Some of what you’ll work on:</p> <ul data-start="991" data-end="1700"> <li data-section-id="1nirwag" data-start="991" data-end="1064">Perform penetration testing as well as purple and red team exercises.</li> <li data-section-id="gbyz9d" data-start="1065" data-end="1149">Conduct threat modeling, code reviews, and design reviews for development teams.</li> <li data-section-id="f4qenc" data-start="1150" data-end="1224">Research new attack techniques and develop strategies to counter them.</li> <li data-section-id="k631bc" data-start="1225" data-end="1320">Develop and enforce security best practices and standards, maintaining internal compliance.</li> <li data-section-id="1g2g0s4" data-start="1321" data-end="1449">Provide solutions to complex security issues, manage multiple tasks, and prioritize effectively in a fast-paced environment.</li> <li data-section-id="7cuubk" data-start="1450" data-end="1539">Present technical security information to both technical and non-technical audiences.</li> <li data-section-id="1ow4dqw" data-start="1540" data-end="1633">Maintain technical documentation, reports, and security tooling with attention to detail.</li> <li data-section-id="vyrupk" data-start="1634" data-end="1700">Participate in other security-related initiatives as assigned.</li> </ul> <h4 data-section-id="14ok1wa" data-start="1702" data-end="1719">Who You Are:</h4> <ul data-start="1720" data-end="2569"> <li data-section-id="ebnxgk" data-start="1720" data-end="1787">5+ years of experience in offensive information security roles.</li> <li data-section-id="k8bgts" data-start="1788" data-end="1922">Proficiency in at least one programming or scripting language (e.g., Go, Python, C/C++) for automation, code reviews, and tooling.</li> <li data-section-id="1bsdmrj" data-start="1923" data-end="2013">Hands-on penetration testing experience and familiarity with offensive security tools.</li> <li data-section-id="1mmhgh4" data-start="2014" data-end="2103">Strong technical knowledge of Linux operating systems and containerized environments.</li> <li data-section-id="tw65ee" data-start="2104" data-end="2184">Experience securing Kubernetes and understanding related security practices.</li> <li data-section-id="f8a69j" data-start="2185" data-end="2275">Able to navigate ambiguity, identify root causes, and solve complex security problems.</li> <li data-section-id="hjx7jq" data-start="2276" data-end="2376">Excellent written and verbal communication skills with strong technical documentation abilities.</li> <li data-section-id="1wewkd3" data-start="2377" data-end="2477">Capable of working independently while managing multiple priorities in a fast-paced environment.</li> <li data-section-id="7wof1h" data-start="2478" data-end="2569">Strong desire to continuously learn and adopt new technologies and security techniques.</li> </ul> <h4 data-section-id="1ss949m" data-start="2571" data-end="2586">Preferred:</h4> <ul data-start="2587" data-end="2969"> <li data-section-id="1sibjmg" data-start="2587" data-end="2711">Experience with firmware reverse engineering, analyzing binaries, bootloaders, and embedded systems for vulnerabilities.</li> <li data-section-id="1xv5l21" data-start="2712" data-end="2780">Relevant certifications such as Sec+, Net+, OSCP, or equivalent.</li> <li data-section-id="1jq8psf" data-start="2781" data-end="2874">Experience with EDR tuning, detections-as-code, or threat hunting as part of a Blue Team.</li> <li data-section-id="18wyksx" data-start="2875" data-end="2969">Deep understanding of business-wide security best practices and implementation strategies.</li> </ul> <p><strong>Wondering if you’re a good fit? </strong><strong>We believe in investing in our people, and value candidates who can bring their own diversified experiences to our teams – even if you aren't a 100% skill or experience match.</strong><strong> Here are a few qualities we’ve found compatible with our team. If some of this describes you, we’d love to talk. </strong></p> <ul> <li>You love hunting vulnerabilities and proactively improving security.</li> <li data-section-id="1dxrw16" data-start="3215" data-end="3287">You’re curious about evolving attack vectors and defense strategies.</li> <li data-section-id="1v4yyrp" data-start="3288" data-end="3395">You’re an expert in offensive security techniques and tooling, with a passion for safeguarding systems.</li> </ul> <p><strong>Why CoreWeave?</strong></p> <p>At CoreWeave, we work hard, have fun, and move fast!&nbsp; We’re in an exciting stage of hyper-growth that you will not want to miss out on. We’re not afraid of a little chaos, and we’re constantly learning. Our team cares deeply about how we build our product and how we work together, which is represented through our core values:&nbsp;</p> <ul> <li>Be Curious at Your Core</li> <li>Act Like an Owner</li> <li>Empower Employees</li> <li>Deliver Best-in-Class Client Experiences</li> <li>Achieve More Together</li> </ul> <p>We support and encourage an entrepreneurial outlook and independent thinking. We foster an environment that encourages collaboration and enables the development of innovative solutions to complex problems. As we get set for takeoff, the organization's growth opportunities are constantly expanding. You will be surrounded by some of the best talent in the industry, who will want to learn from you, too. Come join us!&nbsp;</p> <p><em data-stringify-type="italic">The base salary range for this role is $165,000 to $242,000. The starting salary will be determined based on job-related knowledge, skills, experience, and market location. We strive for both market alignment and internal equity when determining compensation. In addition to base salary, our total rewards package includes a discretionary bonus, equity awards, and a comprehensive benefits program (all based on eligibility).&nbsp;</em></p><div class="content-conclusion"><p><strong>What We Offer</strong></p> <p>The range we’ve posted represents the typical compensation range for this role. To determine actual compensation, we review the m

Related Searches

Explore more opportunities matching this role's title, location, and skills.

Job Title PagesLocation PagesCompany PagesSkill Pages

Ready to apply?

Click below to apply directly on CoreWeave's careers page.

Get the top 10 hyper-growth roles delivered to your inbox every Tuesday.