RDQ324R8
While candidates in the listed location(s) are encouraged for this role, candidates in other locations will be considered.
The Product Security Team's mission is to Left-shift SDLC (Security Development Lifecycle) processes for ALL code written in Databricks (for Customer Use or Supporting Customer internally) to reduce the likelihood of introducing new vulnerabilities in production and minimize the count and effect of externally identified vulnerabilities on Databricks Services.
You will be an individual contributor on the product security team at Databricks, manage SDLC functions for features and products within Databricks. This would include, but is not limited to, security design reviews, threat models, manual code reviews, exploit writing and exploit chain creation. You will also support IR and VRP programs when there is a vulnerability report or a product security incident. You will work with a global team, spread across various locations in the US and EMEA.
The impact you will have :
- Full SDLC Support for new product features being developed in ENG and non-ENG teams. This would include Threat Modeling, Design Review, Manual Code Review, Exploit writing, etc.
- Work with other security teams to provide support for Incident Response and Vulnerability Response as and when needed.
- Work with the results of SAST tools to help evaluate and identify false positives and file defects for real issues.
- Work on DAST tools and related automation for auto-assessment and defect filing.
- Maintain the automation framework and add new features as needed to support different security compliances that Databricks may want to get into – FedRamp, PCI, HIPPA, etc.
- Prioritize security from a risk management perspective, rather than an absolute textbook version.
- Help develop and implement security processes to improve the overall productivity of the product security organization and the SDLC process in general
What we look for :
3+ years of experience with the Threat Modeling process and ability to find design problems based on a block diagram of data flow.Solid understanding on at least two of the following domains - Web Security, Cloud Security, Systems Security and Applied Cryptography.3+ years of experience with one or more of Python / Java / Scala / JavaScript and ability to read code to identify security defects.Strong skills on scripting and automation on exploitsFuzzing skills are good to have.Exploit writing skills is a positive and greatly required.