Team Overview
The Product Security Software Operations team responsibilities stretch from offensive security laser-focused on production systems, infrastructure, and processes to software vulnerability assessment and management across a diverse and extensive codebase that targets both embedded and cloud environments. 

Team Members
We are looking for individuals with a strong software engineering background, and demonstrated passion and expertise in computer security. Whether your strength is in reviewing code and finding critical exploitable flaws, pentesting networked services and writing PoC mitigations, or building custom tools to scan and analyze security controls in cloud infrastructure, we would like to hear from you!

Responsibilities

  • Champions an inventory-centric perspective of software and acts as a cybersecurity-focused supervisor and steward of a large and evolving codebase with many external hardware and software dependencies.
  • Inspects production code in several languages and suggests/implements improvements to remove vulnerable constructs.
  • Tracks CVEs and threat intelligence for multiple platforms, understands multiple large code bases and build environments, evaluates applicability of CVEs; consults with code owners as needed while working autonomously most of the time.
  • Evaluates vulnerabilities: whether published, reported, or internally identified. This includes hands-on work on: implementing PoC software tools, profiling system behavior, and analyzing applicability.
  • Communicates with code owners (stakeholder teams) and balances leaning on those teams to improve coding standards vs. tactically helping out those teams by directly fixing issues. Projects influence into partner teams in order to scale the impact of our work effectively. Champions and fosters good practices at partner teams.
  • Evaluates, adopts, and builds tools to accelerate and automate any of the above tasks in the context of existing data pipelines. Build new data ingest and processing workflows where applicable (example: automated processing of vulnerability feeds and evaluation of applicability).

Qualifications

  • Bachelor’s degree in CS or related field (we would consider candidates without a college degree if they demonstrate the relevant skills via experience and interviews). The best candidates will have relevant advanced degrees and/or solid industry or independent research experience working with production codebases.
  • Demonstrated programming skills in at least one compiled and one interpreted language.
  • Demonstrated ability to think as an attacker and carry out independent, hands-on vulnerability and mitigation analysis.
  • Understanding of vulnerabilities in major software libraries (e.g. openssl, libc…) and their mitigations. Historical perspective on major sources of problems and good intuition and ability to prioritize for return-on-investment among in-house codebase, 3rd party dependencies, CI/CD pipeline security controls, etc.

Bonus Qualifications

  • Track record in finding high-profile, published vulnerabilities as evidenced by CVE and other sources.
  • Track record of open-source contributions, security patches, and similar tangible work products.
  • Relevant cybersecurity certifications or degrees, particularly ones that have a focus on hands-on, technical work: such as OSCP. (Textbook-based IT security certifications are of no applicability.)

Vaccine Mandate

Employees working in this position will be required to have received a single dose of the J&J/Janssen COVID-19 vaccine OR have completed the two-dose Pfizer or Moderna vaccine series. In addition, employees will be required to receive a COVID-19 booster vaccine by the earlier of (1) April 15 or (2) within two months of becoming eligible for the booster vaccine.

Employees will be required to show proof of vaccination status upon receipt of a conditional offer of employment. That offer of employment will be conditioned upon, among other things, an Applicant’s ability to show proof of vaccination status. Please note the Company provides reasonable accommodations in accordance with applicable state, federal, and local laws.

About Zoox

Zoox is developing the first ground-up, fully autonomous vehicle fleet and the supporting ecosystem required to bring this technology to market. Sitting at the intersection of robotics, machine learning, and design, Zoox aims to provide the next generation of mobility-as-a-service in urban environments. We’re looking for top talent that shares our passion and wants to be part of a fast-moving and highly execution-oriented team.


A Final Note:
You do not need to match every listed expectation to apply for this position. Here at Zoox, we know that diverse perspectives foster the innovation we need to be successful, and we are committed to building a team that encompasses a variety of backgrounds, experiences, and skills.