SpecterOps is hiring a

Principal Offensive Security Engineer (macOS)

Seattle, United States

SpecterOps is seeking a principal offensive security engineer to support adversary simulation and detection engagements, perform security research, develop offensive tooling, and create and provide security related training for the macOS platform. In this role you would serve as an internal subject matter expert for the macOS platform.

A successful candidate will have excellent technical skills, impeccable soft skills, and be a well-organized, self-directed individual.

Salary Range (Base salary annually, commensurate with experience): $160,000 - $200,000

Location: This position is remote, based in the U.S. with optional travel quarterly for in person company events and other ad hoc meetings.



  • Serve as a subject matter expert (SME) for offensive macOS operations and related technical capability development

  • Contribute to the development of macOS based agents for the Mythic C2 framework

  • Contribute new or improve existing content for SpecterOps training courses and assist in the delivery of course offerings (e.g., primary instruction and student support)

  • Serve as a primary instructor for the SpecterOps Adversary Tactics: Mac Tradecraft course at private and public offerings (including at BlackHat USA)

  • Conduct security related research into the macOS platform

  • Publish security related content for the macOS platform (e.g., blogs, webinars, white papers, conference talks)

  • Plan and conduct offensive engagements ranging in size, scope, focus, and approach

  • Effectively communicate findings, attack paths, and recommendations, and strategy to technical and executive client stakeholders through written reports and verbal presentations

  • Build scripts, tools, or methodologies to enhance offensive services

  • Utilize common offensive security testing tools and tradecraft

  • Stay up to date with cutting-edge adversary tradecraft and vulnerabilities

  • Effectively communicate successes and obstacles with fellow team members and team lead(s)

  • Interface with client contact(s) and staff in a constructive and professional manner

  • Participate in engagements from kickoff through remediation, and mentoring less experienced team members in relevant macOS tradecraft

  • Train team members in adversary Tactics, Techniques, and Procedures (TTPs) and tools



  • A minimum of 5 years experience in offensive security

  • Strong knowledge of the macOS operating system internals and current security challenges

  • Proficient with Objective-C or Swift

  • Familiarity with ARM (M1/2)-based macOS machines

  • Experience with XPC, TCC, and the hardened runtime on macOS

  • Experience with post-exploitation frameworks such as Mythic, Cobalt Strike, Metasploit, Sliver, or Covenant

  • Strong analytical skills with the ability to collect, organize, analyze, and disseminate significant amounts of information with attention to detail and accuracy

  • Strong written/verbal communication and interpersonal skills

  • Willingness to develop and deliver training content as a lead course instructor

  • Willingness to mentor and train fellow consultants

  • Willingness to support delivery of public and private training offerings (e.g., providing lab support, fielding student questions, etc)

  • Ability to travel domestically and internationally an average of 25% over the course of one year

  • Must be able to pass a criminal background check


Desired Qualifications

  • Strong portfolio of public community contributions (e.g., research, conference presentations, blog posts, white papers, public tool development)

  • Reverse Engineering skills: familiar with debuggers, disassemblers, network protocols, file formats, sandboxes, and hardware/firmware internals 

  • Familiarity with JXA

  • Experience leading small teams and engagements

  • Experience communicating with clients and delivering presentations

  • Experience independently managing client projects

  • Aptitude for technical writing, including assessment reports, presentations and operating procedures

  • Ability to contribute to the majority of offensive security service offerings as part of a team for the full project lifecycle

  • Determination to better self and the overall information security community through research efforts and release through blog posts, conference talk delivery, open-source tool release, and white paper publication

  • Proficient with Active Directory and related offensive techniques

  • Proficient with Windows and *NIX-based operating systems and related offensive techniques

  • Proficient with networking concepts and related offensive techniques


Nice to Haves

  • Bachelor's degree (or above) in a technical field

  • Experience participating in and/or leading Fortune 1000 and/or large Federal Government security assessments

  • Experience in technical writing

  • Experience working for a service-based information security consultancy

  • Experience developing and/or providing technical training

  • Desire to travel internationally and domestically on a more frequent basis (more than 50%)

What We Offer

  • Health/Dental/Vision: 100% covered for employee and family

  • Life insurance: 100% covered

  • 401(k): up to 4% match

  • Equity and a potential bonus based on company performance

  • Flexible paid leave

  • Flexible work schedule

  • Open intellectual property policies; allow researchers to retain rights over open sourced research and tools

  • $225 monthly internet and cell phone stipend

  • $1,000 annual technology/work from home budget

  • $5,000 annual training/conference budget

  • In person and virtual employee events throughout the year

  • And of course, company swag! 

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.


This job is no longer available

Enter your email address below to get notified whenever we find a similar job post.

Unsubscribe at any time.