About Turing
Based in San Francisco, California, Turing is the world’s leading research accelerator for frontier AI labs and a trusted partner for global enterprises deploying advanced AI systems. Turing supports customers in two ways: first, by accelerating frontier research with high-quality data, advanced training pipelines, plus top AI researchers who specialize in coding, reasoning, STEM, multilinguality, multimodality, and agents; and second, by applying that expertise to help enterprises transform AI from proof of concept into proprietary intelligence with systems that perform reliably, deliver measurable impact, and drive lasting results on the P&L
Role Overview
We are looking for highly skilled Cybersecurity Experts to design and develop advanced evaluation tasks for frontier AI models. In this role, you will create realistic, adversarial security scenarios that test an AI model’s ability to understand code, detect vulnerabilities, and reason about complex software security problems.
This is not a traditional security role — you will work at the intersection of offensive security, defensive engineering, and AI evaluation, building reproducible environments and deterministic benchmarks grounded in real-world vulnerability classes.
What does day-to-day look like
- Design and develop multi-vulnerability (multi-CWE) codebases across languages such as Go, Python, Node.js, or Rust
- Create multi-stage attack chains by combining multiple vulnerability classes into realistic exploit scenarios
- Build deterministic evaluation frameworks using containerized environments and automated verification systems
- Write security test cases and exploit checks to ensure vulnerabilities are properly detected and mitigated
- Analyze AI model outputs and reasoning traces to identify failure points in security understanding
- Craft adversarial scenarios including misleading documentation, obfuscated code, and edge-case logic
- Balance between real-world CVE-based scenarios and synthetic vulnerability classes to ensure robust evaluation
- Ensure evaluation tasks are reproducible, scalable, and resistant to data contamination
Requirements
- 4+ years of experience in cybersecurity, application security, or vulnerability research
- Hands-on experience with:Vulnerability discovery (CVE exposure, bug bounty, red teaming, or CTFs)
Secure code review and production-grade patching
- Deep understanding of:Web security (authentication, sessions, OAuth, JWT vulnerabilities)
SSRF, injection attacks (command, template, environment), and access control issues
Cryptographic vulnerabilities (timing attacks, padding oracles, misuse patterns)
Filesystem vulnerabilities (TOCTOU, symlink attacks, path traversal)
- Experience building or using security tools (SAST, fuzzing, IAST, etc.)
- Proficiency in at least one of the following languages: Go, Python, Node.js, Rust
- Familiarity with:Docker and containerized environments
Linux internals and system-level behavior
Writing automated tests (e.g., pytest or similar frameworks)
- Ability to read and analyze obfuscated or minified code
- Strong problem-solving and analytical skills, especially in attack chain reasoning
Perks of Freelancing With Turing
- Work in a fully remote environment.
- Opportunity to work on cutting-edge AI projects with leading LLM companies.
Offer Details
- Commitments Required: 40 hours per week with overlap of 4 hours with PST.
- Engagement Type: Contractor assignment (no medical/paid leave)
- Duration of contract : 1 month; [expected start date is next week]
Evaluation Process
- Round 1: Technical Interview (60 mins)
- Round 2: Delivery interview (30-45 mins)