Offensive Security Researcher - Remote Attack Surface
Paris
April 10, 2026
Apple Custom Ats
Summary
Apple's Security Engineering & Architecture organization is responsible for the security of all Apple products. Passionate about safeguarding our users, we take an offensive approach to defense — finding and fixing vulnerabilities before they can be exploited. When it comes to securing more than a billion devices running the world's most sophisticated operating systems, that means finding vulnerabilities first.
Can you make a difference on this scale? Join our extraordinary team of security researchers and help protect all Apple users.
Description
We engage in various activities, including vulnerability research, binary exploitation, security tooling development, fuzzing, machine learning, and many more. By developing and harnessing state-of-the-art technologies, we amplify our impact on Apple's product security.
In this role, your primary focus will be on the remote attack surface of Apple platforms. You will conduct offensive security research on browsers, messaging applications, media frameworks, and other network-reachable components — areas where a single vulnerability can have the broadest impact on our users. You will work in cross-functional teams alongside other researchers and engineering teams to identify and help eliminate vulnerabilities before they can be exploited.
This job is for individuals with outstanding technical skills, grit, and a genuine passion for breaking systems — so we can build them stronger.
If this is you, we'd love to hear from you.
In-office roles in Paris, Cupertino, and other locations. Remote considered for experienced candidates.
Minimum Qualifications
Proven experience in vulnerability research targeting browsers, messaging applications, or other network-facing attack surfaces
Strong understanding of common vulnerability classes and exploitation techniques relevant to remote attack surfaces, such as memory corruption, logic errors, and type confusion in large C/C++ codebases
Outstanding collaboration skills
Ability to apply AI techniques and tools, such as LLMs or Machine Learning, for security research
Preferred Qualifications
Deep knowledge of browser internals such as JavaScript engine JIT compilation, sandboxing mechanisms, and inter-process communication
Experience auditing and exploiting messaging frameworks and media parsing libraries
Familiarity with network protocol analysis and fuzzing of remote-reachable services
Fluency with tool development, using programming languages such as C, C++, Python, Swift, or Objective-C
Experience with reverse-engineering techniques and tools like IDA or Ghidra
Knowledge of Apple operating systems like iOS or macOS is nice-to-have, but not required