offensive security testing on software supply chains including CI/CD systems, source control, and dependency-based attack vectors Participation in bug bounties, CTFs, vulnerabilityresearch, open source tool development, and security presentations Ability to learn and apply new technologies quickly and in complex deployments Experience testing AI More ❯
you gain new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetration testing & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. BASIC QUALIFICATIONS BS in Computer Science More ❯
teams to continuously validate security throughout the service/system lifecycle. You will be an expert across multiple domains such as cyber security; threat, vulnerability and risk assessments (TVRA), security tools (e.g. Splunk, Crowstrike, etc.), application of security frameworks (e.g. ISM, NIST, etc.) and/or implementation and monitoring … standard and generating high-quality testing plans and reports, striving for excellence in security testing procedures. Conducting offensive security testing and engaging in ongoing vulnerabilityresearch to proactively identify potential risks. Systematically identifying vulnerabilities and meticulously tracking them to facilitate timely remediation efforts. Staying ahead of emerging threats More ❯
teams to continuously validate security throughout the service/system lifecycle. You will be an expert across multiple domains such as cyber security; threat, vulnerability and risk assessments (TVRA), security tools (e.g. Splunk, Crowstrike, etc.), application of security frameworks (e.g. ISM, NIST, etc.) and/or implementation and monitoring … standard and generating high-quality testing plans and reports, striving for excellence in security testing procedures. Conducting offensive security testing and engaging in ongoing vulnerabilityresearch to proactively identify potential risks. Systematically identifying vulnerabilities and meticulously tracking them to facilitate timely remediation efforts. Staying ahead of emerging threats More ❯