Product Security Engineer

ClickHouse ClickHouse · Data AI · Security

This role focuses on product security engineering within ClickHouse, a database company. Responsibilities include collaborating with engineering on security features, identifying vulnerabilities, improving security assurance activities like pentesting and fuzzing, driving the use of security tools (SAST, DAST, SCA), and handling security incidents. The role requires experience with cloud providers, Kubernetes, and security tools, with a preference for C++ development and a security-as-code mindset.

What you'd actually do

  1. Collaborate with engineering and product on improving existing and building new product features with focus on threat modeling, assurance and secure implementation, some examples of recent work include implementation of secure key management, passwordless authentication, m2m authentication, sandboxing and compute/network/storage isolation
  2. Identify security gaps and vulnerabilities in ClickHouse Cloud and OSS, triage a wide range of vulnerabilities reported via our bug bounty program, responsible disclosure, GitHub Issues covering web, API and server - client assets including low level memory issues like heap or buffer overflows
  3. Improve and develop security assurance activities - pentests, vulnerability assessments, bug bounty programs, fuzzing
  4. Drive implementation and usage of engineering security tools - static, dynamic code analysis, dependency checks, code licensing compliance (working knowledge of Snyk, Semgrep, GitHub CodeQL)
  5. Handle information security events and incidents across ClickHouse products and services

Skills

Required

  • Experience supporting engineering and product implementation efforts by performing threat assessments, assurance activities, advisory as well as, in some cases, implementation work across distributed systems covering web, API, client/server assets
  • Strong knowledge of and experience with one or more cloud service providers (e.g. AWS, GCP, Azure), Kubernetes, Cilium, Crossplane
  • Experience implementing and operating engineering security tools and processes (e.g. static / dynamic code analysis, software composition analysis, SBOM, OWASP SAMM, client and network fuzzing tools)
  • Significant development and automation experience
  • Security as code mindset

Nice to have

  • BS, MS, or PhD in Computer Science or related field
  • Previous contributions to open source projects
  • Security or cloud related certifications (AWS, GCP, Azure)
  • ability to work with C++ code

What the JD emphasized

  • security posture
  • security capabilities
  • security processes and tooling
  • threat modeling
  • secure implementation
  • security gaps and vulnerabilities
  • security assurance activities
  • engineering security tools
  • security events and incidents
  • security as code mindset