Related skills
python go php rest apis threat modelingπ Description
- Triage security findings from bug bounties and scanners.
- Assess validity, severity, and escalate with clear summaries.
- Assist with vulnerability assessments of web apps and APIs.
- Write clear security documentation with steps and remediation guidance.
- Support threat modeling: identify trust boundaries and data flows.
- Monitor and operate SAST/DAST and dependency tools.
π― Requirements
- Web security fundamentals: OWASP Top 10, CSRF, XSS, SQLi, etc.
- Web/browser basics: HTTP cycle, REST, cookies, CORS.
- Security testing tools: Burp Suite or similar; intercept, modify, replay requests.
- Vulnerability documentation: reproduce vulnerability and write up impact.
- Secure coding: input validation, encoding, parameterized queries, least privilege.
- Code readability: read PHP, Python, JavaScript, or Go to spot security patterns.
π Benefits
- Bug bounty or CTF participation.
- Scripting: Python or Bash.
- CI/CD pipelines and security tooling familiarity.
- Cloud environments: GCP, AWS, or Azure.
- Entry-level certs: eWPT, CEH.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!