Product Security Engineer - Applications
Remote
Plaid Inc.
Plaid helps companies build fintech solutions by making it easy, safe and reliable for people to connect their financial data to apps and services.The mission of Plaid's Product Security Team is “Improve our customer’s trust by assuring secure development and delivery of products and services, minimizing risk to the ecosystem, and preventing security incidents.” We achieve this by ensuring security measures are available by default to developers, implementing security controls in the CI/CD pipeline, measuring effectiveness of these controls and adjusting them accordingly. We heavily focus on security reviews, threat modeling, building secure architecture, runtime application protection, and reducing risk to the platform.
As a Security Engineer on the Product Security team, you will work with the Engineering team to build secure products, ensuring security controls are available by default and educating stakeholders on best practices and standards. You will build and implement runtime protection on Plaid’s live products by implementing a WAF, automated security scanners, and runtime application protections. You will also participate in security reviews, threat modeling and building secure architecture standards for AWS. You will detect vulnerabilities and triage them with appropriate owners, use vulnerability remediation tools and practices, and follow compliance standards and frameworks.
Major projects may include: building/installing application security testing tools, refining a vulnerability management program, deploying and testing interceptors/wrappers for runtime protection, and coordinating with other security and engineering teams to standardize security policies and standards.
What excites you
- Secure architecture and coding practices, that may include design reviews, threat modeling, code auditing, and security assessments on products/applications developed in-house or externally.
- Build automation to detect and respond to security vulnerabilities identified in the CI/CD pipeline.
- Threat hunting and identifying security vulnerabilities through code review, log analysis, systems monitoring, data flow patterns, etc.
- Deploying and securing cloud services (preferably in an AWS environment).
- Conducting application penetration testing using tools such as: Metasploit, Kali Linux, Burp Suite, etc.
- Deploy and use AST (including IAST & RASP) tools to identify security vulnerabilities.
- Communication in a friendly, supportive manner with software engineers or other stakeholders, helping to not only identify security issues, but also mentor and advocate on novel solutions.
What excites us
- Background working in a product or application security team, protecting scalable enterprise/cloud applications.
- Familiarity with working on security incidents/events to investigate, remediate, and respond to potential threats.
- Experience working with WAF and API security tools.
- Experience with containers (Docker) and Container Orchestration Systems (Kubernetes/ECS), specifically in a security context.
- Experience running PoCs and writing automation scripts to improve the security posture of applications.
- Excellent understanding of OWASP risks, vulnerabilities and mitigation mechanisms.
- Experience with creation and implementation of custom alerting dashboards in SIEM for investigations.
- Experience working on crypto primitives, authentication protocols, and authorization standards (Eg: SSL/TLS, SAML, OAuth, JWT tokens), and implementations within a major cloud provider, preferably AWS.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: APIs Application security Audits Automation AWS Burp Suite C CI/CD Cloud Compliance Crypto Docker Kali Kubernetes Linux Log analysis Metasploit Monitoring OWASP Pentesting POCs Product security SAML Security assessment SIEM TLS Vulnerabilities Vulnerability management
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Ethical hacker / Pentester H/F jobs
- Open Staff Security Engineer jobs
- Open Information Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Analyst jobs
- Open IT Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Chief Information Security Officer jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open ISO 27001-related jobs
- Open Network security-related jobs
- Open Application security-related jobs
- Open Windows-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open DevOps-related jobs
- Open Security assessment-related jobs
- Open Kubernetes-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open CI/CD-related jobs
- Open IDS-related jobs
- Open DevSecOps-related jobs
- Open EDR-related jobs