Security Researcher Mid-level

Permanent contract
Paris
Occasional remote
Salary: €55K to 70K
Experience: > 3 years
Education: Master's Degree

Escape
Escape

Interested in this job?

Questions and answers about the job

The position

Job description

👉 We are seeking a Security Researcher – Mid-level to join Escape and play a central role in advancing the detection capabilities of our DAST and ASM products.

This is an applied security role: think web pentester with strong coding skills. Your mission is to turn offensive security knowledge into scalable, production-grade detection logic.

You will focus on discovering new vulnerability detection techniques, improving existing algorithms, and ensuring Escape remains best-in-class in terms of accuracy, performance, and real-world relevance.

As part of the Security Research team, you will transform security insights and exploitation techniques into concrete detection logic that runs at scale in production. Your work will directly shape the effectiveness of Escape’s scanners and have a measurable impact on customer security outcomes.

Context

  • Location: Paris (75002), 2 days remote/week

  • CompanyEscape – Leading AI Cybersecurity Startup

  • Cofounders: CEO (Tristan Kalos) and CTO (Antoine Carossio)

  • Engineering Team15 Engineers, 4 Technical Leads, 1 Product Owner

  • You’ll be working in a close-knit team of 3 outstanding engineers under supervision of a technical lead

Key Responsibilities:

  • Vulnerability Research: Identify new classes of vulnerabilities across web applications, APIs, and modern architectures, and reproduce real-world exploitation techniques.

  • From Exploit to Detection: Translate manual attack techniques into scalable automated detection logic, designing payload strategies and validation heuristics.

  • Algorithm Design & Improvement: Continuously improve detection algorithms with a strong focus on accuracy, signal quality, and reduction of false positives and false negatives.

  • Applied R&D: Turn research ideas into practical, production-ready detection logic suitable for large-scale automated scanning.

  • Performance & Accuracy Focus: Optimize trade-offs between coverage, noise, scan duration, and infrastructure cost to ensure scanners remain efficient at scale.

  • Cross-Team Collaboration: Work closely with Scanners and Platform teams to integrate research outputs into distributed production systems.

  • Technology Watch: Monitor emerging vulnerabilities, CVEs, and offensive research to continuously raise Escape’s detection capabilities.

Tech Stack

  • Languages: Compiled languages (Go, Rust), scripting languages (Python) for prototyping

  • Research Focus: Vulnerability discovery, detection algorithms, and performance-oriented analysis

  • Execution Context: Research outputs integrated into large-scale automated scanners

  • Collaboration Surface: Close interaction with production systems and distributed scanning workloads

  • Engineering Focus: Accuracy, performance, and applicability of detection logic at scale

Perks

  • 💸 Significant equity (Stock Options/BSCPE), making you a true stakeholder in our success.

  • ❤️‍🩹 Top-tier health insurance with Alan

  • 🍕 Meal vouchers with a Swile

  • 💪 Sport subscription with EGYM Wellpass (ex Gymlib)

  • 📚 A place to learn and grow: Access to books and online courses to help you excel in your role

  • 💻 Top-tier equipment to do your best work

  • 🎁 Free time to work on cool Open Source Projects.

  • 🌎 Opportunities to present research and engineering work at international conferences like RSAC, BSides, BlackHat, DEFCON, APIDays (New York, Las Vegas, San Francisco, London, Paris, Berlin, Barcelona)


Preferred experience

  • 3–5 years of experience: Experience in security research, pentesting, offensive security, or an R&D-oriented engineering role, ideally in an applied or product-driven environment.

  • Strong Web Security Foundation: Solid hands-on expertise in web and API security (OWASP Top 10 and beyond), with the ability to understand and reproduce real-world vulnerabilities.

  • Good CS Fundamentals: Strong understanding of core computer science concepts (networking, systems, concurrency, parsing, etc.) enabling structured reasoning and debugging.

  • Compiled Languages: Comfortable writing production-grade code in at least one compiled language such as Go, Rust, or C/C++. Ability to prototype in scripting languages like Python.

  • Applied Mindset: Ability to turn security insights or exploitation techniques into concrete detection logic with measurable impact.

  • Collaboration Skills: Comfortable working closely with backend engineers to integrate detection logic into scalable production systems.

  • Curiosity & Rigor: Analytical mindset, intellectual curiosity, and attention to detail, with high standards for correctness and signal quality.


Recruitment process

We respect your time and will make it quick and efficient. The entire process will be completed within 1 week.

🤓 1 meeting with the HR representative - 30 minutes

💻 1 Coding challenge - 1 hour

🤔 1 System Design with the Technical Lead - 1 hour

👀 1 Technical Deep Dive interview the CTO - 30 minutes

🚀 1 Impact & Ownership interview with the CEO - 30 minutes

💌 Formal hiring proposal.

Want to know more?

These job openings might interest you!

These companies are also recruiting for the position of “Cybersécurité”.