Senior Cybersecurity Engineer - Bug Bounty
About the position
Wells Fargo is seeking a seasoned Cybersecurity engineer to investigate external bug bounty findings and lead teams through validation, remediation and final closure. In this role, you will: Lead or participate in the research, analysis, design, testing and implementation of complex computer network security and protection technologies for company information and network systems and applications Act as professional ethical penetration tester utilizing hacking tools to modify or create proof of concept exploits that mimic techniques of attackers to identify vulnerabilities and associate with a severity rating by deriving impact and ease of exploit Review and analyze advanced computer security incident response activities and technical investigations of information security related incidents or breach related activates Perform tests on networking devices, appliance products and web based application Implement and develop custom penetration testing techniques and tools Perform security risk assessments to ensure compliance with corporate information security policies and adherence to best practices Provide guidance and leadership to less experienced Information Security Engineers and act as a mentor for these engineers interested in penetration testing, offensive security and bug bounty operations. Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals
Responsibilities
• Lead or participate in the research, analysis, design, testing and implementation of complex computer network security and protection technologies for company information and network systems and applications
• Act as professional ethical penetration tester utilizing hacking tools to modify or create proof of concept exploits that mimic techniques of attackers to identify vulnerabilities and associate with a severity rating by deriving impact and ease of exploit
• Review and analyze advanced computer security incident response activities and technical investigations of information security related incidents or breach related activates
• Perform tests on networking devices, appliance products and web based application
• Implement and develop custom penetration testing techniques and tools
• Perform security risk assessments to ensure compliance with corporate information security policies and adherence to best practices
• Provide guidance and leadership to less experienced Information Security Engineers and act as a mentor for these engineers interested in penetration testing, offensive security and bug bounty operations.
• Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals
Requirements
• 4+ years of Cyber Security Research experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
• Ability to occasionally work non-standard hours
Nice-to-haves
• Deep understanding of how many types of vulnerabilities work
• Ability to effectively communicate and partner with multiple cybersecurity teams to achieve desired outcomes
• Previous experience with bug bounty programs
Apply Now
Apply Now
Wells Fargo is seeking a seasoned Cybersecurity engineer to investigate external bug bounty findings and lead teams through validation, remediation and final closure. In this role, you will: Lead or participate in the research, analysis, design, testing and implementation of complex computer network security and protection technologies for company information and network systems and applications Act as professional ethical penetration tester utilizing hacking tools to modify or create proof of concept exploits that mimic techniques of attackers to identify vulnerabilities and associate with a severity rating by deriving impact and ease of exploit Review and analyze advanced computer security incident response activities and technical investigations of information security related incidents or breach related activates Perform tests on networking devices, appliance products and web based application Implement and develop custom penetration testing techniques and tools Perform security risk assessments to ensure compliance with corporate information security policies and adherence to best practices Provide guidance and leadership to less experienced Information Security Engineers and act as a mentor for these engineers interested in penetration testing, offensive security and bug bounty operations. Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals
Responsibilities
• Lead or participate in the research, analysis, design, testing and implementation of complex computer network security and protection technologies for company information and network systems and applications
• Act as professional ethical penetration tester utilizing hacking tools to modify or create proof of concept exploits that mimic techniques of attackers to identify vulnerabilities and associate with a severity rating by deriving impact and ease of exploit
• Review and analyze advanced computer security incident response activities and technical investigations of information security related incidents or breach related activates
• Perform tests on networking devices, appliance products and web based application
• Implement and develop custom penetration testing techniques and tools
• Perform security risk assessments to ensure compliance with corporate information security policies and adherence to best practices
• Provide guidance and leadership to less experienced Information Security Engineers and act as a mentor for these engineers interested in penetration testing, offensive security and bug bounty operations.
• Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals
Requirements
• 4+ years of Cyber Security Research experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
• Ability to occasionally work non-standard hours
Nice-to-haves
• Deep understanding of how many types of vulnerabilities work
• Ability to effectively communicate and partner with multiple cybersecurity teams to achieve desired outcomes
• Previous experience with bug bounty programs
Apply Now
Apply Now