SWE (Cybersecurity)

Weekday AI
12d$60 - $70Remote

About The Position

We are seeking experienced Software Engineers specializing in Cybersecurity to contribute to high-impact research collaborations with leading AI organizations. In this role, you will help build high-quality training datasets that improve how AI models reason about and solve real-world software engineering and security challenges. This opportunity allows you to apply your expertise in secure software development and vulnerability analysis while helping shape the next generation of intelligent systems. About the Project You will work on SWE-bench–style tasks derived from real open-source repositories, focusing on understanding how advanced AI models approach software engineering and security problems. Since many models do not expose their internal reasoning processes, your work will involve reconstructing and annotating reasoning steps in model-generated trajectories. Using the task context and your own engineering reasoning, you will infer and document the likely decision-making process behind each step.

Requirements

  • 2+ years of software engineering experience, particularly in application security, vulnerability research, or secure software development
  • Degree in Software Engineering, Computer Science, or a related field (Bachelor’s minimum; advanced degree preferred)
  • Strong proficiency in Python, JavaScript, TypeScript, or other common languages used in open-source projects
  • Familiarity with Git workflows, including pull requests, issue tracking, and repository collaboration
  • Ability to articulate technical reasoning clearly through structured written documentation

Responsibilities

  • Design benchmark tasks by identifying vulnerability classes (type/subtype and difficulty level) and validating the intended exploit behavior
  • Create or validate small, runnable codebases (environment repositories) that include data ingestion and prompt/tool usage where trust boundaries may be violated
  • Validate attacks by writing exploit scripts and clearly documenting the resulting unsafe behavior
  • Implement or verify patches that prevent exploits, ensuring the fixes effectively mitigate the vulnerability
  • Produce detailed task metadata, including severity mapping, file and line references, impact analysis, remediation summaries, and relevant documentation
  • Conduct review and quality checks to ensure file paths resolve correctly, line ranges are accurate, sensitive labels are not leaked, and the patch successfully blocks the exploit
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service