Product Security Engineer

ClickHouse ClickHouse · Data AI · United States · Security

Product Security Engineer at ClickHouse, a company specializing in real-time analytics, data warehousing, observability, and AI workloads. The role focuses on enhancing the security posture of platforms and services by collaborating with engineering and product teams on threat modeling, assurance, and secure implementation. Responsibilities include identifying security gaps, managing vulnerabilities, improving security assurance activities like pentests and fuzzing, driving the adoption of engineering security tools (SAST, DAST, SCA), and handling security incidents. The role requires experience in cloud security, Kubernetes, security tools, and automation, with a strong emphasis on a security-as-code mindset.

What you'd actually do

  1. Collaborate with engineering and product on improving existing and building new product features with focus on threat modeling, assurance and secure implementation, some examples of recent work include implementation of secure key management, passwordless authentication, m2m authentication, sandboxing and compute/network/storage isolation
  2. Identify security gaps and vulnerabilities in ClickHouse Cloud and OSS, triage a wide range of vulnerabilities reported via our bug bounty program, responsible disclosure, GitHub Issues covering web, API and server - client assets including low level memory issues like heap or buffer overflows
  3. Improve and develop security assurance activities - pentests, vulnerability assessments, bug bounty programs, fuzzing
  4. Drive implementation and usage of engineering security tools - static, dynamic code analysis, dependency checks, code licensing compliance (working knowledge of Snyk, Semgrep, GitHub CodeQL)
  5. Handle information security events and incidents across ClickHouse products and services

Skills

Required

  • Threat modeling
  • Assurance activities
  • Secure implementation
  • Cloud security (AWS, GCP, Azure)
  • Kubernetes
  • Cilium
  • Static code analysis
  • Dynamic code analysis
  • Software composition analysis (SCA)
  • SBOM
  • OWASP SAMM
  • Fuzzing tools
  • Development and automation
  • C++
  • Security as code

Nice to have

  • BS, MS, or PhD in Computer Science or related field
  • Contributions to open source projects
  • Security or cloud related certifications (AWS, GCP, Azure)

What the JD emphasized

  • threat modeling
  • secure implementation
  • security gaps
  • vulnerabilities
  • bug bounty program
  • responsible disclosure
  • low level memory issues
  • pentests
  • vulnerability assessments
  • fuzzing
  • static, dynamic code analysis
  • dependency checks
  • code licensing compliance
  • engineering security tools
  • information security events and incidents
  • automation