various attack scenarios, to test and improve our detection and response capabilities, and to identify weaknesses in our infrastructure and products.
- Collaborate closely with other parts of the security team and product teams to design defense-in-depth controls that limit attackers' ability and improve our security posture.
- Monitor and analyze emerging cyber threats, vulnerabilities, and exploits relevant to our infrastructure and products.
- Design and execute Red Team Operations against one of the largest and most innovative companies in the world.
- Bring insight into all aspects of modern security issues to our products and rapidly developing prototypes for mitigations.
Qualifications
Minimum Qualifications
- Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, or other relevant majors.
- 3+ years of experience in ethical hacking, vulnerability research, product security, exploit development, penetration testing or being a member of a red team.
- Advanced knowledge and understanding in various disciplines: web application security, mobile app security, network security, operating system internals and hardening, applied cryptography, cloud computing. You're expected to be an expert in at least one of these areas.
- Strong problem-solving skills and excellent debugging / troubleshooting skills.