About the Role
This role involves leading the design and deployment of offensive security and application security solutions, ensuring robust protection through innovative architecture and deep technical expertise.
Responsibilities
- Design and deploy offensive security frameworks tailored to client environments
- Evaluate application security posture using proactive penetration testing methods
- Integrate security controls early in the software development lifecycle
- Collaborate with engineering teams to identify and mitigate vulnerabilities
- Develop threat models for complex distributed systems
- Translate technical risks into actionable business insights
- Support red team operations with architectural guidance
- Advise on secure cloud-native application design
- Lead security assessments for critical infrastructure
- Drive adoption of secure coding practices across development teams
- Create detailed technical documentation for security architectures
- Mentor team members on offensive security techniques
- Stay current with emerging attack vectors and defensive strategies
- Participate in incident response planning and simulations
- Ensure compliance with relevant security standards and regulations
- Optimize security tooling integration within CI/CD pipelines
- Conduct architecture reviews for security weaknesses
- Facilitate workshops on application threat modeling
- Assist in the development of custom exploit detection mechanisms
- Bridge communication between technical teams and leadership
- Promote a security-first mindset in solution design
- Evaluate third-party security tools for suitability and integration
- Support product teams in achieving security certification goals
- Deliver technical presentations to internal and external stakeholders
- Contribute to the evolution of security architecture standards
Compensation
Competitive market rate
Work Arrangement
Remote within Australia
Team
Collaborative, cross-functional security team
Why This Role Matters
Security architecture plays a critical role in preventing breaches before they occur. This position directly influences how systems are designed to resist attacks, ensuring resilience and trust in digital products.
What We Value
We prioritize curiosity, technical depth, and the ability to communicate complex security concepts clearly. Candidates who demonstrate initiative and a passion for offensive security thrive in this environment.
Not available