Senior Analyst (Attack Surface Intelligence)
U.S. Remote
Applications have closed
Bishop Fox
Bishop Fox, the leader in offensive security, continuous pen testing, red teaming, attack surface management, and traditional security assessments.Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. We’ve worked with more than 25% of the Fortune 100, half of the Fortune 10, eight of the top 10 global technology companies, and all of the top global media companies to improve their security. Our Cosmos platform was named Best Emerging Technology in the 2021 SC Media Awards and our offerings are consistently ranked as “world class” in customer experience surveys. We're an active participant in the security community and have published more than 16 open source tools and 50 security advisories in the last five years. Learn more at bishopfox.com or follow us on Twitter.
We’re looking for talented, experienced professional hackers to help us secure some of the world’s most complex software and sophisticated technologies. You’ll be working alongside our US and other internationally-based teams supporting clients across multiple industries.
Who You Are and What You’ll Do
Cosmos (formerly CAST) proactively defends dynamic attack surfaces by combining advanced technology, automation and expert-driven testing by a team of talented offensive security analysts, operators, and developers from a variety of diverse backgrounds. We tackle the challenge of discovering, analyzing, and testing online assets at scale. Together we are building the latest in automation to empower offensive security practitioners to efficiently deliver findings to some of the world's largest companies.
As a Bishop Fox Cosmos analyst, you’ll be empowered to develop meaningful insights into an ever-increasing external attack surface. Utilizing active and passive reconnaissance and enumeration techniques, you’ll discover ephemeral and traditional targets that will expose new attacks of opportunity. Using aggregate information gleaned from previous investigations, you’ll build and maintain a customer intelligence knowledge base that will enable you to translate data into actionable insights.
Why Bishop Fox
Bishop Fox offers competitive salary, generous benefits, flexible schedules, and negotiable travel. If you’re looking for opportunities to grow professionally, this is the place. You’ll work alongside some of the most talented and experienced security consultants in the industry. We have a casual workplace environment, but we‘re consummate professionals.
Your Education and Experience
You just have to be good at and, most importantly, love what you do. Here’s a list of qualities we’re looking for, but don’t think that you need them all:
- Open-source intelligence gathering (OSINT)
- Active and Passive Enumeration and Scanning experience
- Scripting/programming skills (e.g., Python, Golang, Node.js, Bash, etc.)
- Web application penetration testing
- Network penetration testing
- Active GitHub account
- Experience with and contributions to bug bounty programs
- Understanding of security fundamentals and common vulnerabilities (e.g., the OWASP Top Ten)
- 2 - 5 years of application security experience
- Additional experience in IT, security engineering, system and network security, authentication and security protocols, or applied cryptography
- Network and web-related protocol knowledge (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols)
Bishop Fox has always offered its employees to work remotely, and this person could work remotely or be based out of our Tempe, AZ or San Francisco offices.
Interested? Apply today.
By applying for this position, the candidate may have access to confidential information during the interview process.
The candidate agrees to the following:
a) hold the Confidential Information in strict confidence and use all steps that it takes to protect its own information that it considers proprietary or confidential, but in no event shall use less than a reasonable standard of care, to prevent disclosure of Confidential Information to others;
(b) not use the Confidential Information for any purpose other than completing interview process.
"Confidential Information" includes all non-public information, whether written, contained on tape or on other electronic or mechanical media, or oral, relating to a Party’s business operations, assets and/or financial condition including, without limitation, all pricing, mailing lists, financial statements, books and records, other financial information, Trade Secrets, knowledge, proprietary data, data model(s), data integrators, business rules and any related adapters, design specifications, design criteria, inventions, discoveries, know-how, product designs, capabilities, specifications, program code (both source and object), software systems and processes, and the identity of actual and potential clients, data providers and suppliers, patents and patent rights and all other information that is reasonably treated as proprietary and/or confidential and not otherwise known to the general public, whether or not patented or patentable and whether or not copyrighted or copyrightable.
All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, or veteran status
Tags: Application security Automation Bash Cloud Cryptography GitHub Golang Network security Node.js Offensive security Open Source OSINT OWASP Pentesting Python Scripting Security assessment TCP/IP Vulnerabilities
Perks/benefits: Career development Competitive pay Flex hours
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Product Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Sr. Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Forensics-related jobs
- Open Kubernetes-related jobs