Role overview
This role involves applying advanced offensive cybersecurity expertise to evaluate AI-generated content for security risks, vulnerabilities, and exploit patterns. You’ll analyze outputs through a security-first lens, identifying weaknesses, unsafe patterns, and real-world exploitability.
The work centers on structured review, problem creation, and technical validation within an AI research context. It is best suited for experienced penetration testers and offensive security professionals who can think adversarially and apply rigorous technical judgment.
What you’ll actually be doing
- Review AI-generated technical content for security flaws and exploitability risks
- Identify patterns related to common web and application attack vectors
- Craft and solve realistic, security-focused technical challenges
- Apply structured evaluation criteria to assess risk severity and accuracy
- Document findings clearly with technical precision
- Collaborate asynchronously with other cybersecurity experts
Who this role is for
- OSCP-certified professionals with hands-on offensive security experience
- Penetration testers comfortable analyzing real-world attack patterns
- Security engineers who understand web vulnerabilities and exploit chains
- Professionals who can combine adversarial thinking with structured documentation
- Candidates comfortable working independently in an asynchronous environment
Who this role is likely NOT for
- Entry-level cybersecurity candidates without offensive experience
- Professionals focused only on compliance, GRC, or policy-based security
- Developers without formal security testing experience
- Candidates without OSCP certification
- Applicants unable to pass an enhanced background check
Technical background
- Minimum 2+ years of experience in cybersecurity
- OSCP certification (non-negotiable requirement)
- Strong understanding of web security, attack vectors, and exploit methodology
- Experience in penetration testing, CTFs, or offensive security engagements
- Proficiency with Python and/or data analysis tools
- Bachelor’s degree in Computer Science, Information Security, or equivalent practical experience
- Excellent written and verbal English communication skills
Project scope
Potential expansion based on performance and project needs
Short-term pilot sprint engagement
Asynchronous collaboration model
Defined evaluation and review deliverables
