Senior Security Engineer, Application Security
Trail of Bits- Full Time
- Senior (5 to 8 years)
Candidates should possess advanced knowledge of server and client operating systems, extensive computer skills, and a solid understanding of networking, cryptography, web applications, databases, and wireless technologies. They must also have the ability to prioritize impactful findings and drive remediation, along with experience working with Mac, Windows, Linux, and/or other Unix-like variants, and a detailed understanding of how to triage vulnerabilities using CVSS calculators. Furthermore, candidates need to be able to work independently, possess a proactive go-getter attitude, and stay up to date with current vulnerabilities and security-related news.
The Penetration Test Engineer will perform comprehensive penetration testing assessments across the organization, manage the entire lifecycle of penetration testing findings, and work with various business units to perform penetration testing assessments on systems or applications before go-live rollouts. They will examine systems and applications to assess the current security posture, manage penetration testing related tickets, and advocate for security best practices across the organization.
Cloud-native endpoint security solutions provider
CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity field, known for its effectiveness in threat detection and response.