Offensive Security Engineer, 3 with Security Clearance
Reston, VA, United States
Job Description The Oracle Cloud Infrastructure (OCI) Offensive Security team provides OCI with the capabilities to ensure our systems and services meet the security objectives we communicate to customers. The Offensive Security group performs security assessments, vulnerability research, static and dynamic analysis research, penetration testing, red–teaming, and security tool development. We ensure the security of the software and hardware that runs our cloud infrastructure and strive for continuous improvement. The OCI Offensive Security group works as a team. We don't fit people into predefined roles. We bring together the right people who enhance team capability and build roles around each team member's skills and interests. Values are OCI's foundation and how we deliver excellence. We strive for equity, inclusion, and respect for all. We are committed to the greater good in our products and our actions. We are continually learning and taking opportunities to grow our careers and ourselves. We challenge each other to stretch beyond our past to build our future. You can learn more about us by visiting Are you interested in building large–scale distributed security systems and tools for the cloud? Do you love the idea of working in an environment with the excitement of a start–up, but the financial backing of a Fortune 100 company? This role offers huge upside potential, high visibility, and fast career growth without the risks of a typical start–up. We are growing fast, maturing, and working on results–oriented initiatives. A security–focused leader can have significant technical and business impact. This is a unique opportunity to work with smart people to solve complex problems in distributed systems, security, and multi–tenant Infrastructure–as–a–Service (IaaS) operating at massive scale. The biggest challenges for the team is the dynamic and fast growth of the business, driving us to improve our systems, tools, and automation to scale to our security expertise several orders of magnitude greater than what we can support today. We understand that software is living and needs investment. The challenge is making the right tradeoffs, communicating those decisions effectively, and crisp execution. We hope you like working at scale as much as we do because Oracle has no shortage of it! Craft the future of one of the largest clouds on earth with us! Our ideal candidate is a hardworking and hands–on engineer who cares about security and improves their knowledge every day. We're looking for hands–on cloud hackers with expertise and passion in identifying and exploiting complex security problems in distributed, multi–tenant services and infrastructure. We operate distributed systems at a high scale, worldwide. These are the foundations of our cloud environment. Our customers run their businesses on our cloud, and our mission is to provide them with a best–in–class and ever–expanding set of cloud–based services. A security–focused engineer at any level can have significant technical and business impact. Come shape the future of one of the largest clouds on earth with us. To get you excited, here is a list of some of the projects over the last year this team has worked on: Big iron – ExaLogic, ExaData, UltraSPARC, InfiniBand Firmware reverse engineering of various hardware components Developing custom fuzzing platforms for code–coverage analysis Several different hypervisors Linux and Windows kernel mode non–sense The list goes on and on!This role is for a hands–on cloud hacker on the Offensive Security Team. Responsibilities Responsibilities You enjoy diving into complex source code audits to reveal subtle security vulnerabilities
Writing new tools such as fuzzers in languages such as C/C++, Python, Ruby, Go or Java,
Tearing apart an undocumented file format or network protocol
Coming up with novel techniques to solve unique and interesting security problems
Review new services, including their integration points with existing services
Guide security projects beyond the scope of performing assessment work
Identify and disclose vulnerabilities to 3rd party vendors
Design complex systems and services that improve quantity or quality of offensive security output
You'll reviews new features of moderate complexity in existing systems, identifying areas of new risk created; work with service teams to explore and recommend mitigations; and collaborate across service teams and security stakeholdersQualifications TS/SCI Security Clearance with Polygraph Established history of reporting CVEs
Bachelor's degree in computer science, related field or equivalent work experience
Intermediate to advanced experience with virtualization and containerization technologies
Evidence of participation in the security community via contribution to open source projects, tool development, blog writing, or responsibly disclosed vulnerabilities
Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff
Ability to succeed via collaboration and working between internal and external organizations and individuals
Excellent organizational, verbal and written communication skills
Intermediate knowledge of Linux OS Internals
Functional knowledge of one programming language and ability to read one high–level programming language such as Java
Previous role as Security Operations Center (SOC) Analyst, Vulnerability Management, DevOps, CICDPreferred Qualifications Undergraduate or Graduate degree in Electrical Engineering, Computer Science, or another related field or equivalent work experience.
Computer Network Operations Developmental Program (CNODP) completion
System and Network Interdisciplinary Program (SNIP) completion
Joint Cyber Development Program (JCDP) completion
Remote Interactive Operations Training (RIOT) Future Operator Readiness and Growth (FORGE)
Hands–on experience developing services on a public cloud platform (e.g., AWS, Azure, Oracle)
Building continuous integration/deployment pipelines with robust testing and deployment schedules
Experience working with internal customers and translating requests into prioritized work or features
Expertise in applying risk identification techniques to develop security solutions
Experience and understanding of Cryptographic algorithms, standards, implementation and application
Experience and understanding of threat modeling, penetration testing, reverse engineering and attacks on software
Experience working with large enterprise customers
CREST certification
#J-18808-Ljbffr