National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Security Engineer, Red Team

Databricks Inc.
London
1 week ago
Applications closed

Related Jobs

View all jobs

Senior Cloud Security Engineer

Senior Application Security Engineer

Principal Cybersecurity Researcher (Reverse Engineering)

Senior Security Engineer

Senior Security Engineer

Senior Security Engineer

The Red Team is committed to proactively identifying and mitigating security threats across our infrastructure, applications, and cloud environments. Through rigorous offensive security assessments, adversarial testing, and vulnerability research, we aim to uncover and address weaknesses before they can be exploited by real-world attackers. By simulating real-world attack scenarios, we help enhance our security posture, ensuring resilience against emerging threats and fostering a culture of security awareness throughout the organization.

The Impact You Will Have:

You will be a key member of the Red Team at Databricks, conducting security assessments, developing novel attack techniques, and working across teams to improve our defensive capabilities. Your work will involve:

  • Conducting Red Team operationson cloud environments, infrastructure, and applications to identify and exploit security weaknesses in both development and production environments.
  • Developing and refining tools, exploits, and automationto simulate real-world adversarial techniques against enterprise security controls.
  • Performing vulnerability research and exploit development,including discovering zero-days, bypassing security controls, and creating proof-of-concept exploits.
  • Assessing cloud security risksacross AWS, Azure, and GCP environments, including IAM misconfigurations, container security, and lateral movement strategies.
  • Collaborating with internal security and engineering teamsto provide remediation guidance, enhance security monitoring, and improve detection and response capabilities.
  • Researching emerging threatsin cloud security, web applications, and infrastructure, sharing findings internally and contributing to the broader security community.
  • Performing security design reviewsto ensure new products and infrastructure components are built with security best practices from inception.

What We Look For:

The ideal candidate will have a strong background in offensive security, cloud security, and vulnerability research.

  • Expertise in Red Teaming, penetration testing, and adversary simulation techniques.
  • Deep knowledge of cloud security (AWS, Azure, GCP), including IAM, networking, containers, orchestration (kubernetes) and serverless architectures.
  • Strong programming skills in Python, C/C++, or Go for exploit development, automation, and tool creation.
  • Experience developing and weaponizing exploits for vulnerabilities in cloud environments, applications, and infrastructure.
  • Strong understanding of modern attack techniques, including phishing, persistence mechanisms, privilege escalation, and lateral movement.
  • Knowledge of security tooling (e.g., C2 frameworks, EDR evasion, malware development, fuzzing, and reverse engineering).
  • Excellent problem-solving skills and the ability to think like an adversary.
  • Strong communication skills,with the ability to document findings clearly and present them to technical and non-technical audiences.
  • Typically 4+ years of experience in offensive security,vulnerability research, or Red Teaming, or an advanced degree (MS/PhD) with 3+ years of experience in the security domain.
  • BS or higher in Computer Science, Cybersecurity, or a related field.

If you're passionate about offensive security and enjoy breaking things to make them better, we'd love to hear from you!

About Databricks

Databricks is the data and AI company. More than 10,000 organizations worldwide — including Comcast, Condé Nast, Grammarly, and over 50% of the Fortune 500 — rely on the Databricks Data Intelligence Platform to unify and democratize data, analytics and AI. Databricks is headquartered in San Francisco, with offices around the globe and was founded by the original creators of Lakehouse, Apache Spark, Delta Lake and MLflow. To learn more, follow Databricks on Twitter ,LinkedIn and Facebook .

Benefits

At Databricks, we strive to provide comprehensive benefits and perks that meet the needs of all of our employees. For specific details on the benefits offered in your region, please visithttps://www.mybenefitsnow.com/databricks .

Our Commitment to Diversity and Inclusion

At Databricks, we are committed to fostering a diverse and inclusive culture where everyone can excel. We take great care to ensure that our hiring practices are inclusive and meet equal employment opportunity standards. Individuals looking for employment at Databricks are considered without regard to age, color, disability, ethnicity, family or marital status, gender identity or expression, language, national origin, physical and mental ability, political affiliation, race, religion, sexual orientation, socio-economic status, veteran status, and other protected characteristics.

Compliance

If access to export-controlled technology or source code is required for performance of job duties, it is within Employer's discretion whether to apply for a U.S. government license for such positions, and Employer may decline to proceed with an applicant on this basis alone.


#J-18808-Ljbffr

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.