Security Engineer II- SDL

Gurugram, Haryana, India

Applications have closed

Junglee Games

Junglee Games provides the most thrilling, action-packed desktop and mobile games engineered by the world's best tech minds.

View company page

As our Security Engineer II- SDL, you will be working on the following.


Responsibilities:

  • Build and maintain security tools to automate defect discovery
  • Build and maintain vulnerability management tools to manage defects
  • Build automated solutions to help incorporate Security in all stages of software development (app and infra). This includes (but is not limited to) SAST, DAST and Container Scanning
  • Experience writing custom rules with Semgrep is a plus
  • Experience in reducing false positives in an automated manner is a plus
  • Work closely with developers to help them adopt secure SDL best practices
  • Build systems to measure the progress of Secure SDL adoption across the organization
  • Design a secure application release automation process to make security an integral part of the CI/CD pipelines.

Requirements

  • Engineering degree in computer science or related field. A masters's degree is a plus
  • 3-5 years Experience in information security, Application development
  • Experience with Application Security tools and techniques.
  • Ability to grasp new technology concepts quickly
  • Prior experience integrating Security practices into SDLC is a plus
  • Working knowledge of Go/Python/PHP is a strong plus
  • We strongly believe in using and contributing to open source. Contribution to open-source software is a plus
  • Ability to work in a team environment and interact with people
  • Work directly with internal infrastructure teams (DevOps) to align and execute infrastructure changes to support the tools, apps and processes
  • Good documentation and communication skills
  • Ability to make concrete progress in the face of ambiguity and imperfect knowledge


Good to have Skills

  • Knowledge and experience in web application security testing, vulnerability assessment, penetration testing, and generating reports using tools like Burp Suite, Paros, AppScan, Wireshark, Nmap, and Nessus.
  • Experience with security issues in Cloud Technologies (AWS, GCP, Azure) is a plus
  • Experience with Docker and containerization technologies
  • Understanding of cryptography primitives
  • Hall of fames (Good to have)


About Junglee Games


Junglee Games is a leader in the skill-gaming space, with close to 75 million users. Founded in San Francisco in 2012, and part of the $30 Bn Flutter Entertainment Group, Junglee Games is the fastest-growing skill-gaming company in the world. Some of our notable games are Junglee Rummy, Howzat, Eatme.io and Solitaire Gold.

Our mission is to build entertainment for millions of people around the world and connect people through high-quality games.

Since we were founded, we've drawn 500 of the world’s most talented people into our ranks. Our team has worked on international AAA titles like Transformers, Star Wars: The Old Republic, Real Steel, Rio, Mech Conquest, and Dueling Blades. Our designers have worked on some of Hollywood’s biggest hits including the movie Avatar.

Junglee is not just a gaming business - it is a blend of data science, innovation, cutting-edge technology and, most importantly, a values-driven culture that is creating the next set of conscious leaders. Junglee Games is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security Automation AWS Azure Burp Suite CI/CD Cloud Computer Science Cryptography DAST DevOps Docker GCP Nessus Nmap Open Source Pentesting PHP Python SAST SDLC Vulnerability management

Region: Asia/Pacific
Country: India
Job stats:  4  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.