This Job Vacancy has Expired!

Vulnerabilities Research Architect

Request Technology - Craig Johnson

Posted on May 24, 2023 by Request Technology - Craig Johnson

Oakland, CA 94601
IT
Immediate Start
Annual Salary
Full-Time

*We are unable to sponsor for this Remote permanent role*

*Position is bonus eligible*

Prestigious Enterprise Company is currently seeking a Vulnerabilities Research Architect. Candidate will be responsible for analysing systems, software, and security strategies to discover previously unknown vulnerabilities to proactively identify and mitigate emerging threats. This is accomplished by performing manual and automated source code review, binary analysis, vulnerability assessments, threat modelling, and security architecture review. This role requires research into the latest threat actors, attack vectors, and the offensive security techniques. Development of custom tooling and automation will be required to supplement manual vulnerability discovery.

Responsibilities:

  • Performs vulnerability assessments using industry best practices on various environments, including web applications, APIs, and cloud infrastructure
  • Develops and manages testing methodologies that adhere to common security guidelines and NIST standards
  • Conducts an evaluation of cloud security configurations, identifies prevalent vulnerabilities in cloud security controls, and improves and maintains cloud testing standards
  • Provides detailed reports with proof of vulnerabilities, guidance, and advice to support customer teams through vulnerability remediation
  • Develops and communicates comprehensive and accurate reports and presentations for client stakeholders including technical staff and executive leadership
  • Maintains communication with management regarding development within assigned responsibilities and performs special projects as required
  • Researches and develops innovative techniques, tools, and methodologies for vulnerability research and red team activities
  • Exercises thought leadership in the development and execution of security threats and malicious actors
  • Develops leadership-level communications, including management specific metrics, white papers, procedures, thought position papers, etc.

Qualifications:

  • 7+ years of work experience in the Cyber Security industry
  • Bachelors Degree in Computer Science or Management Information related field, or equivalent work experience
  • Understanding of all phases of adversary emulation operations including reconnaissance, social engineering, exploitation, post-exploitation, covert techniques, lateral movement, and data exfiltration
  • Extensive experience in offensive cybersecurity roles, such as red teaming, penetration testing (eg, web, infrastructure, cloud), purple team exercises in cloud and on-prem environments
  • A robust understanding of contemporary security theory and application exploitation techniques and attack vectors (including the vulnerability life cycle and scanning methodologies (SAST, DAST, IAST, RASP)
  • Experience developing and managing testing methodologies that adhere to common security guidelines such as OWASP and frameworks such NIST 800 or MITRE ATT&CK
  • A solid understanding of computer architecture and organization with respect to binary analysis and exploitation
  • Ability to analyze, create, and debug shellcode and other low-level exploits
  • Experience developing custom security (either offensive or defensive) software in one or more compiled languages
  • Demonstrated abilities to reverse engineer binaries, enumerate vulnerabilities in compiled software, and provide working exploits (eg, CVEs, public acknowledgements, or ability to demonstrate on demand)
  • Familiarity with automated security analysis and fuzzing tools (eg, AFL and Peach)
  • Demonstrated ability to discover vulnerabilities via static analysis and source code review
  • A working understanding of key programming languages and frameworks (eg, Java, Node.js, Python, JSP, etc.), including the ability to pick up new languages quickly, understand the security implications of those languages, and enumerate vulnerabilities in custom-developed software packages that leverage those languages
  • Familiarity with Scripting/programming of Python, PowerShell, or C# with the ability to create and customize tools

Reference: 2562659574

CareerAddict

Alert me to jobs like this:

Vulnerabilities Research Architect in Oakland, CA, Full-Time

Amplify your job search:

CV/résumé help

Increase interview chances with our downloads and specialist services.

CV Help

Expert career advice

Increase interview chances with our downloads and specialist services.

Visit Blog

Job compatibility

Increase interview chances with our downloads and specialist services.

Start Test