Home > Find Jobs
USA
Posted on: 30 August 2023
Experience
n/a
Work
n/a
Employee Type
n/a
Salary Range
n/a
Short facts about us:
Our product:
Wallarm API security solutions provide proven performance to support innovative companies serving millions of users and billions of API requests per month. Hundreds of Security and DevOps teams globally use Wallarm daily to:
Our technology stack:
In this role you will:
Security research domain:
Organization of the process of analyzing actual WEB/API threats.
Taking part in the review, quality control, and technical design of the threat detection and prevention mechanisms.
Constantly generating and pushing ideas for improving current security products
Organization and leading complex security researchers.
Leading security research team, people management, etc.
Defining the vision and strategy of the security value that Wallarm provides to customers.
Product management domain:
Work closely with key customers to gather and analyze customer problems and use cases to gain a deep understanding of requirements.
Develop and maintain a detailed requirements backlog and a roadmap supported by market analysis and competitive positioning.
Take an active role in defining the future Wallarm API Security Platform, create and maintain a vision for your product area, and suggest new innovative features that can become competitive advantages.
Facilitate communication and work collaboratively throughout the development process between various internal teams, including engineering, marketing, sales, customer support, and executives.
In this role you’ll need:
Excellent communication and interpersonal skills
Experience in web application audits
Deep knowledge of all types of attacks on web applications (CWE, OWASP Top 10, OWASP API Top 10); understanding of various protocols and attacks on them (JWT, GraphQL, Websockets, etc.).
Prior experience in leadership roles, leading and managing one or more teams.
Strong mathematical background and ability to apply mathematical principles effectively in the context of cybersecurity research.
Additional advantages will be:
What we offer:
Tags