Examine the products in detail to discover vulnerabilities and collaborate with the other security engineers to practically demonstrate the exploitability and risk factors.
Be on the forefront of emerging vulnerabilities/threats that could affect Cashfree products through independent research and study.
Engage with the developers in developing workarounds/mitigation plans and ensure they are implemented per policy.
Threat Modelling: Engage with the development teams to conduct secure design reviews/threat modeling exercise to enumerate threats and mitigation strategies.
Enable the developers with knowledge of threat modeling by conducting focused workshops.
Secure Coding: Priorities critical defects and ensure these are identified and mitigated during the sprint.
Integration and automation of SAST in the DevOps pipeline.
Build secure coding principles and propagate them across the development community.
Be the togo person for developers in solving critical issues relating to secure product development.
Build and enhance secure coding / security assessments training contents for developers and QA team.
Deliver training programs at various levels in the organizations.
Conduct workshops/security techtalks to disseminate security knowledge and awareness. Qualifications.
Good knowledge in multiple classes of vulnerabilities that includes crosssite scripting SQL Injection CSRF cryptographic related weakness and code injection.
Good knowledge of any programming/scripting languages such as Java Ruby and Python.
Good knowledge relating to services/technology relating to the cloud.
Ability to automate security testing and improve productivity in security assessments.
Ability to communicate and interpret security vulnerabilities to various audiences such as development and management teams.
Requirements:
You have great interpersonal skills deep technical ability and a history of successful in the assessments industry. If you enjoy discussing anything from procedural linking tables in kernels to remote code in JVMs then we want you on the team.
Familiarity with industrystandard threat modeling risk modeling and vulnerability classification.
Experience with preassessment architectural and API analysis to scope and prepare whitebox and greybox assessments.
Experience working with inhouse engineering organizations SSDLC/CICD software lifecycle and QA processes
B. Tech. in Computer Science Electrical or Computer Engineering or equivalent work experience as a software engineering or security practitioner.
3 years of relevant engineering or security assessment experience experience in application security.
Possess a broad knowledge of attack vectors exploits and mitigations that work at scale or may be linked together for chained attacks.
Experience with Java Go Python or Node.js (bonus points for more than one).
Experience with assessing Cloudnative services service meshes and K notesplatformbased microservices.
Be able to apply unconventional thinking and problemsolve on the boundary of your knowledge base learning new technologies or languages as needed to complete pentest tasks.
Be able to think both offensively (like a hacker) and defensively (evaluating product security and design)
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.