Product Security Engineer

ClickHouse ClickHouse · Data AI · Security

Product Security Engineer role focused on enhancing the security posture of ClickHouse's platforms and services, including threat modeling, vulnerability identification, secure implementation, and driving the adoption of security tools and processes.

What you'd actually do

  1. Collaborate with engineering and product on improving existing and building new product features with focus on threat modeling, assurance and secure implementation, some examples of recent work include implementation of secure key management, passwordless authentication, m2m authentication, sandboxing and compute/network/storage isolation
  2. Identify security gaps and vulnerabilities in ClickHouse Cloud and OSS, triage a wide range of vulnerabilities reported via our bug bounty program, responsible disclosure, GitHub Issues covering web, API and server - client assets including low level memory issues like heap or buffer overflows
  3. Improve and develop security assurance activities - pentests, vulnerability assessments, bug bounty programs, fuzzing
  4. Drive implementation and usage of engineering security tools - static, dynamic code analysis, dependency checks, code licensing compliance (working knowledge of Snyk, Semgrep, GitHub CodeQL)
  5. Handle information security events and incidents across ClickHouse products and services

Skills

Required

  • threat modeling
  • assurance activities
  • secure implementation
  • distributed systems
  • web, API, client/server assets
  • cloud service providers (AWS, GCP, Azure)
  • Kubernetes
  • Cilium
  • engineering security tools and processes
  • static / dynamic code analysis
  • software composition analysis
  • SBOM
  • OWASP SAMM
  • client and network fuzzing tools
  • development and automation experience
  • C++ code
  • Security as code mindset

Nice to have

  • BS, MS, or PhD in Computer Science or related field
  • Previous contributions to open source projects
  • Security or cloud related certifications (AWS, GCP, Azure)

What the JD emphasized

  • threat modeling
  • secure implementation
  • security gaps and vulnerabilities
  • low level memory issues like heap or buffer overflows
  • pentests
  • vulnerability assessments
  • bug bounty programs
  • fuzzing
  • static, dynamic code analysis
  • dependency checks
  • code licensing compliance
  • security events and incidents
  • automation and scale