Goldman Sachsposted about 2 months ago
Full-time - Entry Level
Dallas, TX
Securities, Commodity Contracts, and Other Financial Investments and Related Activities

About the position

Led by the Chief Information Security Officer (CISO), Technology Risk secures Goldman Sachs against hackers and other cyber threats. We are responsible for detecting and preventing attempted cyber intrusions against the firm, helping the firm develop more secure applications and infrastructure, developing software in support of our efforts, measuring cybersecurity risk, and designing and driving implementation of cybersecurity controls. The team has global presence across the Americas, APAC, India and EMEA. Within Technology Risk, the Global Cyber Defense & Intelligence (GCDI) identifies malicious activity, manage the lifecycle of vulnerabilities within GS technologies, and investigates and manages threats across the firm. We are a team of security, software, and product engineers that allow the firm to respond appropriately to firm risks through the use of detection models, security architecture, and cutting-edge cyber threat analysis to manage internal and external threats against the firm. The Bug Bounty team within GCDI performs one of the most important security and risk functions at the firm - working with external security researchers to detect vulnerabilities in our technology and ensuring their remediation before they can be exploited by malicious hackers. The Goldman Sachs has one of the most progressive Technology Risk teams in the industry and is continuing to push the development of risk in preference to security within technology and the business. Year on year success has led the team to work deeper into the organization and gain valuable insights into how technology needs to function, what its risk really is and how this impacts the business.

Responsibilities

  • Execute and support the firm's global Bug Bounty program as part of the team within Technology Risk.
  • Triage vulnerability reports submitted to our Bug Bounty program - includes tracking and responding to submissions, reproducing and chaining vulnerabilities, coordinating with teams to triage and resolve issues, and providing feedback to security researchers.
  • Assess vulnerability impact, risk, and escalate possible security incidents.
  • Work directly with project teams to help them understand the risk of vulnerabilities and provide remediation guidance.
  • Collaborate extensively with the firm's engineering teams and adjacent advisory and vulnerability management teams to track remediation timelines and ensure vulnerabilities fixes are scheduled and implemented in a timely manner.
  • Develop tooling to help automate vulnerability discovery and scanning for issues at scale.
  • Leverage learnings from the program to identify vulnerabilities in software applications and software designing processes to reduce security risks.
  • Share learnings from the bug bounty program with adjacent security teams within the Firm as needed.
  • Stay up to date with new technologies and assist engineers in assessing risk.
  • Enable a world-class cyber defense program by working closely with other technical, incident management, and forensic personnel to develop a fuller understanding of activity of cyber threat actors.

Requirements

  • At least 2 years of hands-on application, infrastructure, or cloud security experience, including penetration testing, application/network assessments and risk assessments.
  • Strong practical understanding of web, network, and mobile application security vulnerabilities such as OWASP Top 10.
  • Experience conducting root cause analysis of vulnerabilities and determining feasible technical solutions.
  • Experience using industry standard vulnerability assessment and management tools and interpreting, analyzing and assessing their data output.
  • Clear communication skills, both verbal and in writing, including the ability to clearly articulate technical vulnerabilities and associated risks to both technical and non-technical audiences.
  • Experience working within a vulnerability management or related program in a complex and diverse global environment.
  • A passion for, and deep understanding of, the technical aspects of information security with particular focus on vulnerability and threat management.

Nice-to-haves

  • Prior experience managing or hunting on Bug Bounty programs.
  • Bachelor's degree or higher in Computer Science, Information Systems, Cyber Security or a related field is preferred.
  • CEH, OSCP or equivalent certification.
  • Working knowledge/experience with programming, scripting to help develop bulk scanning tools.
  • Experience working as part of a global team.
Hard Skills
Cyber Defense
1
Cyber Threat Analysis
1
Incident Management
1
Information Sciences
1
Vulnerability Assessments
1
19L 0jHALdEin Ru4FbjSlAyefP
0
1L42R3Y AZkxyYqP5sJ
0
78GLSZJQjtRVrv MsYruGvnaK
0
CaVo07v GNnW68DpZAu
0
Df0J5 Nt1wJ
0
FOubMl9g5U vgXB6b9Ho4G
0
H4KI1uRD69s KVTroWmhb
0
ZqJ5MNmdDP3c gbk8UV9S
0
a8u7Z NftU8gB0xeO
0
dDkvHZft0b9 E4pUnFdlQ
0
enAoH415fSXO BRCEfNhcW
0
lvK4nH536 ZQN1VDq
0
nzPQou9 CELN9DUjtReXTm k5ryVEJ
0
pEVu7Iqow iGdYtcX9hJ
0
pZGQL5tPu 9xW3DXgriajzt
0
qvuO3 QyLbWa szqr26chY
0
yEFnY8pRCqhZau rcVWHI3vz9G
0
Soft Skills
XlmRe 21oXTpPk8VS
0
Build your resume with AI

A Smarter and Faster Way to Build Your Resume

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service