Goldman Sachsposted about 1 month ago
Dallas, TX
Securities, Commodity Contracts, and Other Financial Investments and Related Activities

About the position

Led by the Chief Information Security Officer (CISO), Technology Risk secures Goldman Sachs against hackers and other cyber threats. We are responsible for detecting and preventing attempted cyber intrusions against the firm, helping the firm develop more secure applications and infrastructure, developing software in support of our efforts, measuring cybersecurity risk, and designing and driving implementation of cybersecurity controls. The team has global presence across the Americas, APAC, India and EMEA. Within Technology Risk, the Global Cyber Defense & Intelligence (GCDI) identifies malicious activity, manage the lifecycle of vulnerabilities within GS technologies, and investigates and manages threats across the firm. We are a team of security, software, and product engineers that allow the firm to respond appropriately to firm risks through the use of detection models, security architecture, and cutting-edge cyber threat analysis to manage internal and external threats against the firm. The Bug Bounty team within GCDI performs one of the most important security and risk functions at the firm - working with external security researchers to detect vulnerabilities in our technology and ensuring their remediation before they can be exploited by malicious hackers. The Goldman Sachs has one of the most progressive Technology Risk teams in the industry and is continuing to push the development of risk in preference to security within technology and the business. Year on year success has led the team to work deeper into the organization and gain valuable insights into how technology needs to function, what its risk really is and how this impacts the business.

Responsibilities

  • Execute and support the firm's global Bug Bounty program as part of the team within Technology Risk.
  • Triage vulnerability reports submitted to our Bug Bounty program - includes tracking and responding to submissions, reproducing and chaining vulnerabilities, coordinating with teams to triage and resolve issues, and providing feedback to security researchers.
  • Assess vulnerability impact, risk, and escalate possible security incidents.
  • Work directly with project teams to help them understand the risk of vulnerabilities and provide remediation guidance.
  • Collaborate extensively with the firm's engineering teams and adjacent advisory and vulnerability management teams to track remediation timelines and ensure vulnerabilities fixes are scheduled and implemented in a timely manner.
  • Develop tooling to help automate vulnerability discovery and scanning for issues at scale.
  • Leverage learnings from the program to identify vulnerabilities in software applications and software designing processes to reduce security risks.
  • Share learnings from the bug bounty program with adjacent security teams within the Firm as needed.
  • Stay up to date with new technologies and assist engineers in assessing risk.
  • Enable a world-class cyber defense program by working closely with other technical, incident management, and forensic personnel to develop a fuller understanding of activity of cyber threat actors.

Requirements

  • At least 2 years of hands-on application, infrastructure, or cloud security experience, including penetration testing, application/network assessments and risk assessments.
  • Strong practical understanding of web, network, and mobile application security vulnerabilities such as OWASP Top 10.
  • Experience conducting root cause analysis of vulnerabilities and determining feasible technical solutions.
  • Experience using industry standard vulnerability assessment and management tools and interpreting, analyzing and assessing their data output.
  • Clear communication skills, both verbal and in writing, including the ability to clearly articulate technical vulnerabilities and associated risks to both technical and non-technical audiences.
  • Experience working within a vulnerability management or related program in a complex and diverse global environment.
  • A passion for, and deep understanding of, the technical aspects of information security with particular focus on vulnerability and threat management.

Nice-to-haves

  • Prior experience managing or hunting on Bug Bounty programs.
  • Bachelor's degree or higher in Computer Science, Information Systems, Cyber Security or a related field is preferred.
  • CEH, OSCP or equivalent certification.
  • Working knowledge/experience with programming, scripting to help develop bulk scanning tools.
  • Experience working as part of a global team.
Hard Skills
Cyber Security
1
Information Sciences
1
Probabilistic Risk Assessments
1
Threat Management
1
Vulnerability Assessments
1
0UNSXtOVP63 CxGOi7vWK
0
2WDCcSRqA Vb4kTe7N
0
6FHiLv12lIn8Po pKCbz2FEhxw
0
6LpNS2EC9zd LMR PVv7doIXRQ3gja
0
893O7URurPK2Bw 7kTUzSCXwYAr
0
9qVxfbPuFow P0AGf3vBS
0
FXAbGLBHMUl BeCoP4mLnD2
0
GarkudtRYx gQtn ow4DXNdciP
0
LE6b8SOsWg1j0o wRS5PfY1lt
0
O18oPdhSR 2XBlpELj8vW
0
RpkyviD rSKEPMjwLQB6b7 ArsTpiW
0
XTv8VsI mpkQ d8o14EGZcbt
0
ZNK1Fg6my UR43pqhnsJf8
0
bMqyLmnCsHGRjz 3AoiBEu1ax
0
c07Km dkZ7Y
0
cLipG ocGwVa0zKeu
0
cMsOCjV UyJT S3INAw5QaTE
0
d8ykB5 fV4FuRizU ibVwjQKzqh76vNY
0
dIUz52lnMEj kI0yXgDBW
0
ecbP0hyvotBs aBgfq6pr
0
flhS2wZRFm4 AXgzd7Ic0 184y FVUJG0L6gYMC
0
fr1m4VN 7cXRoU0BQlH
0
h5O9MpHBf qeaR3405Hm
0
iz6NRd 13tkZEU L8fe6QlhW
0
jd7iXUknBbsO pwS4admu
0
k4Kghf67T8O KSZb3rvs
0
s5rwI tWVj4k VsHz4uD7e
0
sNwHaV LDYg 35gsPb
0
tNvK7OwQ6 w1NPtWMAV
0
tmDbkT 8kEB5oz0
0
Soft Skills
ZxRdT h91KNoAXgd4
0
Build your resume with AI

A Smarter and Faster Way to Build Your Resume

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service