Security Solutions Architect

Remote Europe

Applications have closed

Bugcrowd

Bugcrowd teams with elite security researchers to reduce risk & improve security ROI through our bug bounty, pen testing, & vulnerability disclosure programs.

View company page

Bugcrowd is the world’s #1 crowdsourced security company. Our award-winning platform combines actionable, contextual intelligence with the skill and experience of the world’s most elite hackers to help leading organizations solve security challenges, protect customers, and make the digitally connected world a safer place.

Security architects assess their organizations’ information technology and computer systems, identifying strengths and weaknesses. They understand what is needed to conduct effective penetration tests, risk analyses, and ethical hacks on local area networks, wide area networks, and virtual private networks. They also assess routers, firewalls, and comparable systems to determine efficacy and efficiency.

Security architects think like hackers. They push existing computer and network security systems to their limits. Once security architects identify vulnerabilities in existing systems, they brainstorm with clients on boosting security structures.The Security Solutions Architect role is customer-facing. The ideal candidate is a quick learner of complex concepts, a consummate professional, and an effective communicator with proven excellence in building cross-functional relationships. Furthermore, it is heavily preferred if they have a strong understanding of common security issues and concepts such as the OWASP Top Ten, common pentesting/vulnerability assessment tools, general web/tech acumen, and a passion for delivering results. Acting as both Sherpa and Customer Advocate, the Solutions Architect role is integral in creating and articulating a clear path to success for clients, as well as providing technical guidance across a wide variety of situations.

Primary Role Responsibilities:

  • Develop new security architectures. You blend knowledge of security hardware and software, organizational needs, and cybersecurity risks with organizational policies and industry standards.
  • Work effectively and independently to consult clients - articulating a clear path to success for clients, as well as providing technical guidance across a wide variety of situations including technical guidance for in-house Technical Customer Success Managers, as needed. In doing this, it will be necessary to: 
  • Manage client feedback by providing invaluable input, feedback, and guidance to the Product team. 
  • Act decisively, independently, and confidently across a wide variety and range of circumstances and situations. This role includes a large amount of autonomy in day-to-day operations and comes with a high degree of implicit trust to be able to execute with minimal supervision. To this end, it’s critical that the right candidate also is able to demonstrate complete and total ownership of any/all responsibilities related to the role. 
  • Provide detailed documentation for all client interactions while also exhibiting exemplary written and verbal communication skills in both internally and externally facing capacities.

Desired Skills & Experience:

  • Proficiency in using command-line tools and utilities (Bash, SSH, grep, etc), Burp Suite, and nmap 
  • Ability to exploit common security vulnerabilities - at a minimum, the OWASP top ten, but ideally beyond
  • Possesses technical proficiency to perform at least one of the following: web application, mobile, API, network, or IoT pentesting
  • Able to create a mental (or written) model of a target’s attack surface and understand what types of attacks would be commonly leveraged against targets of a particular genre.
  • Able to work in a cross-departmental capacity that can serve as a clear source of guidance for a wide range of security and bug bounty-related questions.
  • Experience creating documentation and policies to support the role (blogs, collateral, etc).
  • Able to independently find solutions to both technical and non-technical problems with no apparent answer (aggressive googling, stack overflow, etc).
  • Familiarity with at least one scripting language (Python, Ruby, Bash, etc) to a degree of proficiency that simple tools can be made to help automate tasks, workflow, etc.

Culture:

  • At Bugcrowd, we understand that diversity in the workplace is vital to a company’s success and growth. We strive to make sure that people are included and have a sense of being part of making Bugcrowd not only a great product but a great place to work.
  • We regularly hear from both customers and researchers that Bugcrowd feels like a family, and we strive to maintain that internally as well.
  • Our team consists of a broad range of people: musicians, adventure sports junkies, nature lovers, parents, cereal enthusiasts, night owls, cyclists, artists—you get the point..

Perks:

  • Competitive salary and stock options.
  • Opportunities to attend & host relevant conferences & meetups.
  • Flexible vacation time.
  • Exceptional medical, dental & vision coverage.
  • Generous allowance to build the workstation that suits you.
  • Company-sponsored off-sites and celebrations.
  • Pre-tax commuter benefits.
  • 401k.

At Bugcrowd, we are solving security threats and vulnerabilities that are relevant to everyone, therefore we believe solving these problems takes all kinds of backgrounds. We value the perspectives and experiences people from underrepresented backgrounds bring. We are a supportive & collaborative team who understand that reaching Bugcrowd’s potential depends on the happiness of the employee.

Background Checks:

The company is authorized to obtain background checks for employment purposes and may include identity verification, prior employment verification, personal and professional references, educational verification, and criminal history. Applicants with conviction histories will not be excluded from consideration to the extent required by law and will be reviewed on a case by case circumstance.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: APIs Bash Burp Suite Exploit Firewalls Network security Nmap OWASP Pentesting Python Ruby Scripting SSH Vulnerabilities

Perks/benefits: Career development Competitive pay Conferences Equity Flex vacation Health care Startup environment

Regions: Remote/Anywhere Europe
Job stats:  82  6  0
Category: Architecture Jobs

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.