Principal Vulnerability Research & Development Engineer
Мэтч & Сопровод
Для мэтча с этой вакансией нужен Plus
Описание вакансии
TL;DR
Principal Vulnerability Research & Development Engineer: Leading the offensive security team and breaking 's systems before adversaries can, with an accent on offensive security research, bug bounties and CTFs. Focus on finding and exploiting bugs in various technologies and collaborating with threat hunters to prevent future occurrences.
Location: Must be located in the United States.
Company
is scaling its team to help enable and accelerate its growth in data warehousing and analytics.
What you will do
- Lead the offensive security team.
- Proactively break systems to identify vulnerabilities before adversaries.
- Collaborate with threat hunters to prevent recurrence of identified vulnerabilities.
- Prove findings with data-driven analysis.
Requirements
- Experience in offensive security research, bug bounties, CTFs, fuzzing, tools, and techniques.
- Proficiency in finding and exploiting bugs in C++, Java, JavaScript, Go, and Python.
- Experience with Kubernetes, AWS, GCP, and Azure.
- Understanding of memory management, namespaces, cgroups, etc.
- Prior experience building or contributing to an offensive security program at a senior level.
- Strong communication skills and ability to work cross-functionally.
Culture & Benefits
- Focused on improving security practices.
- Exploring new security domains across clouds and the platform.
- Strong demand and business support for security initiatives.
- Collaborative team with diverse backgrounds and skills.
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →