Senior Security Engineer (Python, WordPress & PHP) (remote-only, Europe)

CloudLinux
Palo Alto, United States of America
7 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English

Job location

Remote
Chiva, Spain

Tech stack

PHP
Software System Penetration Testing
Python
WordPress
Large Language Models
Metasploit
REST

Job description

We are looking for a Senior Security Engineer who understands exploitation deeply but prefers building tooling and automation over one-off research. You will work on systems that:

  • Automatically generate and validate exploit PoCs for known WordPress / PHP CVEs Analyze PHP execution traces from real zero-day attacks against WordPress installations

LLMs are a first-class component of this work-not a novelty-used to accelerate exploit reconstruction, PoC generation, and attack workflow automation.

This is an engineering role with offensive depth, not a traditional pentesting or red-team position.

What You'll Build

  • Systems to ingest, normalize, and analyze PHP execution traces:
  • Function calls, parameters, control flow, side effects
  • No native binary reversing - focus is PHP-level execution and logic
  • Tooling that infers:
  • vulnerable code paths
  • authorization and logic flaws
  • nonce and state-handling weaknesses
  • Automated pipelines that:
  • convert CVE descriptions + PHP source code into working PoCs
  • replay inferred exploit paths deterministically
  • LLM-assisted frameworks for:
  • exploit skeleton generation
  • parameter and payload inference
  • exploit mutation and robustness testing
  • High-fidelity exploit simulations targeting:
  • admin-ajax.php
  • WordPress REST APIs
  • plugin-specific endpoints
  • Infrastructure that transforms exploit mechanics into signals usable by detection and prevention systems.

Requirements

Do you have experience in WordPress?, Do you have a Master's degree?, + PHP execution model and request lifecycle

  • WordPress internals (nonces, hooks, REST, admin flows)
  • HTTP semantics, sessions, cookies, and authorization
  • Proven ability to read, reason about, and exploit PHP source code.
  • Strong Python engineering skills for building:
  • automation pipelines
  • analysis tooling
  • exploit frameworks

Nice to have:

  • Exploit framework usage experience like, MSF, Core Impact, Immunity Canvas.
  • Prior experience using LLMs to automate exploit development:
  • PoC generation
  • workflow automation
  • payload mutation or inference
  • Experience with:
  • execution traces or application-level call graphs
  • fuzzing or vulnerability discovery pipelines
  • Familiarity with tools like: WPScan, Nuclei, Metasploit, Burp.
  • Contributions to exploit tooling, frameworks, or security automation. Public CVEs or PoCs (helpful but not required)

Benefits & conditions

What's in it for you?

  • A focus on professional development.
  • Interesting and challenging projects.
  • Fully remote work with flexible working hours, that allows you to schedule your day and work from any location worldwide.
  • Paid 24 days of vacation per year, 10 days of national holidays, and unlimited sick leaves.
  • Compensation for private medical insurance.
  • Co-working and gym/sports reimbursement.
  • Budget for education.
  • The opportunity to receive a reward for the most innovative idea that the company can patent.

About the company

Join a company where people build innovative products and thrive in a remote-friendly environment. 

🔗 Learn more:
 cloudlinux.com | imunify360.com | tuxcare.com

Apply for this position