Offensive Security Engineer - Klaviyo|Meet.jobs

薪資

123k - 184k USD Annually

技能需求

    工作機會描述

     

    Klaviyo is searching for our next Offensive Security team member. This position is a unique opportunity to develop tools and techniques for offensive web application penetration testing. You will execute against our existing code base, while also testing new features / functionality. You will work to protect Klaviyo, our customers, and their data. This position will require you to use your technical expertise to study the Klaviyo web application, find and verify risks, and work with engineering teams to address any findings.

    The ideal candidate will be an offensive cybersecurity professional with a passion for analyzing codebases, testing hypotheses, and designing tools to impact web applications and their infrastructure. Responsibilities include triaging bug reports, assisting engineering teams with mitigation, and conducting manual web application testing using tools like Burp Suite Professional. Proven experience in compromising web applications and APIs in cloud environments, scripting for security testing, and clear communication of vulnerabilities is essential.

    How you’ll make a difference:

    • Partner with Engineering, Product, IT, and other business functions to drive security improvement across the organization
    • Research emerging attack vectors, vulnerabilities and techniques
    • Utilize your offensive skills to identify weaknesses and build defenses against those who may point their attacks at Klaviyo
    • Develop custom payloads and exploits
    • Emulate adversaries by attacking web applications, supporting services, and cloud platforms
    • Collaborate closely with detection engineers to build high fidelity alerting based on emerging attack vectors and tactics, techniques and procedures
    • Triage and respond to bug bounty submissions related to the application
    • Actively participate in purple-team exercises to mature the security program

    Qualifications:

    • 4+ years of experience in offensive security engineering disciplines (red teaming, penetration testing, fuzz testing, etc.).

      • Web application / API offensive security testing is a must have
    • Experience using open source and commercial scanners / exploit tools such as Burp / Nessus / OWASP ZAP as a reconnaissance tool.

    • Demonstrated application of cyber threat intelligence open source or commercial to guide testing / exploitation.

    • Substantial scripting or developing in Python during the past 2 years.

    Klaviyo