Box is looking for an engineer who has worked to onboard and optimize SAST, DAST and SCA tools. This engineer understands the various automated scanning methodologies and can build scanning tools, when needed. This person will onboard, optimize and automate testing solutions that scale the verification of security vulnerabilities with high quality output.
We’re looking for someone who can optimize output from security scanning tools to reduce false positives to enable high quality actionable vulnerability outputs.
3+ years previous experience in DevSecOps with a strong focus on security tool onboarding and/or optimization
Experience with security testing tools and devops integrations
Knowledge of OWASP Top 10, Dynamic Application Security Testing (DAST), Static Application Security Testing (SAST), and Threat Modeling tools
Experience with software vulnerability management, including thorough vulnerability risk analysis and mitigation plans
Familiarity with multiple languages such as Java, React, Node JS, PHP, Scala, C and/or Python
Understanding of how to detect and prioritize Front End, API's, Microservices and Container vulnerabilities
Familiar with common build/automation tooling: ex. Jenkins, GIT
You understand secure engineering best practices, can articulate problem statements and propose solutions to both technically savvy and non-technical audiences
You are either a passionate security minded devsecops/software engineer/devops who has been a part of building high quality applications and services
You have worked on onboarding and/or maintaining SAST, DAST and SCA tools
You have a growth mindset, push yourself towards excellence and focus on continuous functional improvements
You are a curious person who looks at problem statements and can clearly propose actionable solutions
You have a passion for cyber security demonstrated through participation/leadership in conferences, webinars, Capture the Flag (CTF), TryHackMe, HacktheBox, Bug Bounty, Submission of CVEs and/or personal projects
Strong understanding of past, current, and emerging security exploits
Share