Information Security Associate - CIR-1
India - Hyderabad
Salesforce
Bieten Sie die beste Customer Experience mit einem einzigen CRM-Tool für Sales, Kundenservice, Marketing, Commerce & IT. Jetzt 30 Tage testen!To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.
Job Category
Enterprise Technology & InfrastructureJob Details
About Salesforce
We’re Salesforce, the Customer Company, inspiring the future of business with AI+ Data +CRM. Leading with our core values, we help companies across every industry blaze new trails and connect with customers in a whole new way. And, we empower you to be a Trailblazer, too — driving your performance and career growth, charting new paths, and improving the state of the world. If you believe in business as the greatest platform for change and in companies doing well and doing good – you’ve come to the right place.
Security Vulnerability Handler
Responsibilities
Salesforce - the leader in enterprise cloud computing and #1 on Fortune's "Best Companies to Work For" list - is seeking a Security Vulnerability Handler to join one of the world's leading vulnerability response teams.
The security vulnerability response team at Salesforce deals with the most challenging problems in information security. The pace and variety of our work creates a unique learning environment, whether you are starting out or have deep security experience. You will be given unique challenges and the tools to solve them, surrounded by exceptional colleagues, and supported by incredibly helpful partner teams.
Security Vulnerability Handlers are responsible for leading the response to lower severity vulnerabilities and participating in the response to high severity vulnerabilities. Successful vulnerability handlers thrive on challenge, are calm under pressure, and can think on their feet.
This position is based in our Hyderabad operations center which operates 5 days per week, weekdays only.
Required Skills
5-7 (Grade 6) years experience in information security or closely related roles, with direct experience of security vulnerability response.
Ability to manage and constantly triage multiple security vulnerabilities, differentiating urgent issues from the merely important.
Ability to stand back from a complex problem, logically assess the facts, and formulate a plan of action - even in the worst of situations.
Experience managing common types of security vulnerabilities, e.g., OWASP Top 10.
Familiarity with common threats and issues related to security vulnerabilities, e.g., credential phishing, internal data spillage events, and inadvertent data leaks.
Application forensics skills, including collecting and analysing code artifacts to assess potential impact if the vulnerability were to be exploited.
Superior verbal and written communication skills, including the ability to effectively and clearly communicate complex scenarios to non-technical colleagues.
Exceptional technical basics, including networking fundamentals, common application protocols, system architecture, and basics of software development.
Strong knowledge of web proxy tools and techniques.
Ability to research and learn unfamiliar technologies quickly, adapting existing knowledge and processes to investigate and resolve security issues.
Broad information security knowledge, including some familiarity with key regulations and standards relating to security vulnerability response.
Desired Skills
Prior experience in a large and complex organization, operating across numerous locations and with a high degree of change.
Experience reproducing proof of concept exploitation steps. ● Experience judging the priority of a vulnerability based on risk and impact. ● Experience securing applications and infrastructure in Amazon Web Services and similar IaaS / PaaS platforms.
Deep application security knowledge, with the ability to map an application vulnerability to exploitation indications and relevant investigative techniques.
Relevant incident response or information security certifications, such as GIAC GWAPT, GIAC GCIH, GIAC GPEN, GIAC GXPN, Offensive Security OSCP.
Accommodations
If you require assistance due to a disability applying for open positions please submit a request via this Accommodations Request Form.
Posting Statement
At Salesforce we believe that the business of business is to improve the state of our world. Each of us has a responsibility to drive Equality in our communities and workplaces. We are committed to creating a workforce that reflects society through inclusive programs and initiatives such as equal pay, employee resource groups, inclusive benefits, and more. Learn more about Equality at www.equality.com and explore our company benefits at www.salesforcebenefits.com.
Salesforce is an Equal Employment Opportunity and Affirmative Action Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender perception or identity, national origin, age, marital status, protected veteran status, or disability status. Salesforce does not accept unsolicited headhunter and agency resumes. Salesforce will not pay any third-party agency or company that does not have a signed agreement with Salesforce.
Salesforce welcomes all.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Application security Cloud Forensics GCIH GIAC GPEN GWAPT GXPN IaaS Incident response Offensive security OSCP OWASP PaaS Vulnerabilities
Perks/benefits: Career development Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.