Senior Attack Engineer, AWS SME

Horizon3 AI
$181,000 - $242,000Remote

About The Position

We’re seeking an AWS Subject Matter Expert to join our Cloud Attack team and lead our AWS offensive strategy and execution. This person will be the internal authority on attacking, validating, and explaining real-world AWS attack paths using NodeZero in customer environments. You’ll help shape the most impactful AWS attack content, and partner closely with Attack Engineering and Product to ensure NodeZero stays aligned with modern cloud attacker tradecraft. This is a high-impact role for someone who is deeply fluent in AWS security and offensive cloud operations, and who enjoys turning cloud chaos into crisp attacker narratives and scalable product feedback. Ideal candidates are hands-on AWS offensive practitioners who can operate independently, communicate clearly with customers, and thrive in a fast-moving offensive security startup.

Requirements

  • 7+ years in offensive security with deep AWS specialization.
  • Strong expertise in AWS security architecture and attacker tradecraft, including:
  • IAM and identity attack paths (role chaining, federation abuse, privilege escalation)
  • Resource and data access abuse (S3, RDS, DynamoDB, EBS snapshots, Secrets Manager, Parameter Store)
  • Compute/container attack patterns (EC2, ECS, EKS, Lambda)
  • Network/external perimeter and control-plane abuse (VPC misconfigs, SG/NACL issues, API exposure)
  • Multi-account org/landing zone compromise scenarios
  • Ability to chain AWS attack paths end-to-end and explain exploitability and impact clearly.
  • Familiarity with tooling such as Pacu, ScoutSuite, Prowler, CloudSploit, awscli-based tradecraft, or custom cloud offensive tooling.
  • Strong Python development skills required, along with the ability to read and modify offensive tooling in Go, C++, C#, or other systems languages.
  • Strong understanding of cloud platform concepts, APIs, and automation pipelines.
  • Comfortable with Git and PR workflows; experienced collaborating with engineering teams on productized capabilities.
  • Working knowledge of CI/CD and infrastructure-as-code patterns, including hands-on familiarity with CloudFormation stacks, Terraform, and CDK, to reason about real customer deployments.
  • Proven experience delivering AWS offensive work where customer outcomes matter (consulting, red team, cloud security product, or hybrid).
  • Ability to translate AWS field realities into crisp product requirements and prioritized feedback.
  • Excellent communication and storytelling skills for technical and non-technical audiences.
  • Highly self-directed with strong judgment in ambiguous cloud environments.
  • Comfortable being both hands-on and strategic: can dive deep technically and lead the broader AWS attacker narrative.
  • Operates with urgency while maintaining a high bar for safety, quality, and customer trust.
  • Strong cross-functional partner who creates tight learning loops between AWS reality and NodeZero product evolution.

Nice To Haves

  • AWS certifications (Security Specialty, Solutions Architect Professional, etc.) are a plus.
  • Offensive/cloud certifications (OSCP/OSEP/CCSP/CCSK or equivalent).
  • Public research/blogs/CVEs/open-source contributions related to AWS security.
  • Experience applying AI/LLM tools to cloud recon, triage, or workflow automation.
  • Familiarity with Azure/GCP is a bonus but not required.

Responsibilities

  • Research, develop, and validate AWS offensive capabilities for NodeZero — spanning external AWS API attack surfaces, assumed-breach VPC scenarios, and single-account, multi-account, and hybrid deployments. Ensure all capabilities are production-safe, high-signal, and attacker-realistic.
  • Research and weaponize AWS misconfigurations, vulnerabilities, and emerging attacker techniques, chaining them into meaningful attack scenarios (identity abuse, data access, control-plane compromise) and keeping NodeZero aligned with the fast-changing AWS threat landscape.
  • Own AWS offensive methodology and playbooks: discovery → exploitation → privilege escalation / lateral movement → verification → customer narrative.
  • Partner with Attack Engineering and Product to translate AWS field learnings into prioritized roadmap input and productized attack content.
  • Serve as the AWS security subject matter expert for customer technical briefings, internal enablement, and select external content (blogs, demos, conference talks).
  • Mentor Cloud Attack teammates and raise the bar for cloud offensive rigor, delivery quality, and customer-facing clarity.

Benefits

  • Inclusive Team: We value diversity and promote an inclusive culture where everyone can thrive.
  • Growth Opportunities: Be part of a dynamic and growing team with numerous career development opportunities.
  • Innovative Culture: Work in a collaborative environment that encourages creativity and out-of-the-box thinking.
  • Remote Work: We are a 100% remote company. Enjoy the flexibility to work in the way that supports you and brings out your best.
  • Competitive Compensation: We offer competitive salary, equity and benefits. Our benefits include health, vision & dental insurance for you and your family, a flexible vacation policy, and generous parental leave.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service