Senior Analyst (Attack Surface Intelligence)

U.S. Remote

Applications have closed

Bishop Fox

Bishop Fox, the leader in offensive security, continuous pen testing, red teaming, attack surface management, and traditional security assessments.

View company page

Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. We’ve worked with more than 25% of the Fortune 100, half of the Fortune 10, eight of the top 10 global technology companies, and all of the top global media companies to improve their security. Our Cosmos platform was named Best Emerging Technology in the 2021 SC Media Awards and our offerings are consistently ranked as “world class” in customer experience surveys. We're an active participant in the security community and have published more than 16 open source tools and 50 security advisories in the last five years. Learn more at bishopfox.com or follow us on Twitter.

We’re looking for talented, experienced professional hackers to help us secure some of the world’s most complex software and sophisticated technologies. You’ll be working alongside our US and other internationally-based teams supporting clients across multiple industries.

Who You Are and What You’ll Do

Cosmos (formerly CAST) proactively defends dynamic attack surfaces by combining advanced technology, automation and expert-driven testing by a team of talented offensive security analysts, operators, and developers from a variety of diverse backgrounds.  We tackle the challenge of discovering, analyzing, and testing online assets at scale. Together we are building the latest in automation to empower offensive security practitioners to efficiently deliver findings to some of the world's largest companies. 

As a Bishop Fox Cosmos analyst, you’ll be empowered to develop meaningful insights into an ever-increasing external attack surface. Utilizing active and passive reconnaissance and enumeration techniques, you’ll discover ephemeral and traditional targets that will expose new attacks of opportunity. Using aggregate information gleaned from previous investigations, you’ll build and maintain a customer intelligence knowledge base that will enable you to translate data into actionable insights.  

Why Bishop Fox

Bishop Fox offers competitive salary, generous benefits, flexible schedules, and negotiable travel. If you’re looking for opportunities to grow professionally, this is the place. You’ll work alongside some of the most talented and experienced security consultants in the industry. We have a casual workplace environment, but we‘re consummate professionals.         

Your Education and Experience

You just have to be good at and, most importantly, love what you do. Here’s a list of qualities we’re looking for, but don’t think that you need them all:

  • Open-source intelligence gathering (OSINT)  
  • Active and Passive Enumeration and Scanning experience 
  • Scripting/programming skills (e.g., Python, Golang, Node.js, Bash, etc.) 
  • Web application penetration testing  
  • Network penetration testing 
  • Active GitHub account  
  • Experience with and contributions to bug bounty programs  
  • Understanding of security fundamentals and common vulnerabilities (e.g., the OWASP Top Ten)  
  • 2 - 5 years of application security experience  
  • Additional experience in IT, security engineering, system and network security, authentication and security protocols, or applied cryptography   
  • Network and web-related protocol knowledge (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols) 

Bishop Fox has always offered its employees to work remotely, and this person could work remotely or be based out of our Tempe, AZ or San Francisco offices.

Interested? Apply today.

By applying for this position, the candidate may have access to confidential information during the interview process.   

The candidate agrees to the following: 

a) hold the Confidential Information in strict confidence and use all  steps that it takes to protect its own information that it considers  proprietary or confidential, but in no event shall use less than a  reasonable standard of care, to prevent disclosure of Confidential  Information to others; 

 (b)  not use the Confidential Information for any purpose other than  completing interview process. 

"Confidential Information" includes all non-public information, whether written, contained on tape or on other electronic or mechanical media, or oral, relating to a Party’s business operations, assets and/or financial condition including, without limitation, all pricing, mailing lists, financial statements, books and records, other financial information, Trade Secrets, knowledge, proprietary data, data model(s), data integrators, business rules and any related adapters, design specifications, design criteria, inventions, discoveries, know-how, product designs, capabilities, specifications, program code (both source and object), software systems and processes, and the identity of actual and potential clients, data providers and suppliers, patents and patent rights and all other information that is reasonably treated as proprietary and/or confidential and not otherwise known to the general public, whether or not patented or patentable and whether or not copyrighted or copyrightable. 

All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, or veteran status

 

 

Tags: Application security Automation Bash Cloud Cryptography GitHub Golang Network security Node.js Offensive security Open Source OSINT OWASP Pentesting Python Scripting Security assessment TCP/IP Vulnerabilities

Perks/benefits: Career development Competitive pay Flex hours

Regions: Remote/Anywhere North America
Country: United States
Job stats:  21  3  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.