Summary
Posted: 05 May 2026
Weekly Hours: 35
Role Number: 200660425-2114
Description
The Adversary Simulation Program (ASP) is a branch of Information Security responsible for emulating real-world adversaries through offensive security engagements and automation. We build and operate the frameworks and tooling that power our engagements and extend detection and response capabilities across Apple. We are seeking a Security Engineer with a passion for offensive security and automation to conduct adversary simulations, execute offensive security engagements, and build the tooling that makes those efforts scalable and repeatable.
As a Security Engineer on this team, your work will split between hands‑on offensive security engagements and building the automation that makes those engagements scale. On any given week you might be scoping an adversary simulation against a production service, writing Go code to automate parts of the engagement lifecycle, or translating your findings into clear remediation guidance for engineering teams. You will think like an attacker – planning intrusion paths, chaining vulnerabilities, and testing defences – while also partnering with detection and response teams to close the gaps you uncover. This is a role where you build what you use: the frameworks, tooling, and workflows you develop directly power the engagements you run, and your work shapes how the organisation identifies and responds to real‑world threats.
Responsibilities
* Develop and maintain adversary simulation frameworks and automation tooling to support engagements and scale our capabilities
* Scope, plan, and execute offensive security engagements across Apple services and infrastructure
* Automate engagement workflows including finding validation, remediation tracking, and adversary behaviour testing
* Translate findings into actionable tasks for engineering teams and communicate risk clearly to stakeholders
* Build relationships with engineering and leadership teams to drive security improvements
* Identify telemetry gaps and contribute to detection validation alongside cross‑functional security teams
* Conduct design reviews and provide guidance on secure development practices
Minimum Qualifications
* Experience in a security engineer, security consultant, penetration tester, or similar role
* Expertise in threat modeling, secure architecture design, and reviewing complex systems
* Strong capability in penetration testing applications, infrastructure, cloud environments and Golang
* Experience communicating risk to engineering and leadership teams
Preferred Qualifications
* Bachelor's degree in Computer Science or related field (or equivalent experience)
* Relevant certifications (e.g., OSCP, OSWE, OSMR)
* Experience with CTFs, bug bounty programs, or published research
* Community contributions like public CVEs, open source tools, blogs, or talks
* Experience constructing adversary scenario narratives and building exploit chains
* Experience with adversary simulation frameworks or detection validation tooling
* Experience with Swift
Equal Employment Opportunity
At Apple, we believe in treating all applicants fairly and equally. We are a registered Disability Confident employer, and we strive to provide reasonable accommodations. Apple considers all qualified applicants with criminal backgrounds in a manner consistent with applicable law.
Accessibility
At Apple, we consider accessibility a fundamental human right. We welcome diverse perspectives, including individuals with disabilities, by providing accessible workplaces, benefits, and digital tools.
#J-18808-Ljbffr