- Source, plan and lead in-depth offensive privacy red team operations.
- Execute deep technical, hands-on, offensive privacy testing to identify and exploit privacy weaknesses.
- Work with cross-functional teams to drive remediation of privacy weaknesses.
- Effectively communicate findings from operations to a technically diverse audience.
- Continuously identify and test ways that we can be better by improving team processes.
- Be an advocate for best practice in protecting user data against privacy threat actors.
- Planning and leading campaign-style red team operations testing response capabilities/teams.
- 5+ years experience in a related discipline such as red teaming, penetration testing, vulnerability research, product security or security/privacy research.
- 3+ years hands-on offensive testing skills (e.g. offensive security, pentesting, red teaming, vulnerability research, etc.).
- 2+ years experience of scripting (PHP, Python, Perl, Ruby, etc.).
- Communication experience with researchers, engineering and product teams.
- Experience with offensive testing of at least one of the following: web, iOS, Android.
- Experience with big data and relational databases (Hive, Presto, MySQL, etc.).
- Contributions to the privacy or security community (participation in bug bounty programs, public research, blogging, presentations, etc.).
Individual pay is determined by skills, qualifications, experience, and location. Compensation details listed in this posting reflect the base salary only, and do not include bonus, equity or sales incentives, if applicable. In addition to base salary, Meta offers benefits. Learn more about benefits at Meta.