Explore jobs filtered by the tags pillar for exploit-development to find offensive security, exploit development, and vulnerability research positions across startups, enterprise security teams, and specialized research labs. This curated list highlights openings requiring practical skills such as reverse engineering, memory corruption analysis, fuzzing, exploit chaining, kernel and userland exploitation, and proficiency in C/C++, Assembly, Python, and exploit frameworks, and supports long-tail searches like "remote exploit development engineer", "kernel exploit researcher", or "embedded device exploit developer" to narrow results. Get actionable insights on role requirements, typical deliverables (proofs of concept, exploit demos, security advisories), recommended portfolio items, and hiring organization types; use the filtering UI to refine by experience level, location, remote status, and apply or save jobs to track opportunities.
No Exploit Development jobs posted this month
Check back soon or explore all available positions