Назад
Company hidden
обновлено 29 дней назад

Principal Vulnerability Research & Development Engineer

Формат работы
onsite
Тип работы
fulltime
Грейд
principal
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Principal Vulnerability Research & Development Engineer: Leading the offensive security team and breaking hirify.global's systems before adversaries can, with an accent on offensive security research, bug bounties and CTFs. Focus on finding and exploiting bugs in various technologies and collaborating with threat hunters to prevent future occurrences.

Location: Must be located in the United States.

Company

hirify.global is scaling its team to help enable and accelerate its growth in data warehousing and analytics.

What you will do

  • Lead the offensive security team.
  • Proactively break hirify.global systems to identify vulnerabilities before adversaries.
  • Collaborate with threat hunters to prevent recurrence of identified vulnerabilities.
  • Prove findings with data-driven analysis.

Requirements

  • Experience in offensive security research, bug bounties, CTFs, fuzzing, tools, and techniques.
  • Proficiency in finding and exploiting bugs in C++, Java, JavaScript, Go, and Python.
  • Experience with Kubernetes, AWS, GCP, and Azure.
  • Understanding of memory management, namespaces, cgroups, etc.
  • Prior experience building or contributing to an offensive security program at a senior level.
  • Strong communication skills and ability to work cross-functionally.

Culture & Benefits

  • Focused on improving security practices.
  • Exploring new security domains across clouds and the hirify.global platform.
  • Strong demand and business support for security initiatives.
  • Collaborative team with diverse backgrounds and skills.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →