Product Security Engineer

ClickHouse ClickHouse · Data AI · Security

Product Security Engineer at ClickHouse, focusing on enhancing the security posture of their platforms and services. Responsibilities include threat modeling, vulnerability identification and triage, security assurance activities (pentests, fuzzing), driving the adoption of security tools (SAST, DAST, SCA), and handling security incidents. The role requires experience with cloud providers, Kubernetes, and security automation, with a strong emphasis on a security-as-code mindset.

What you'd actually do

  1. Collaborate with engineering and product on improving existing and building new product features with focus on threat modeling, assurance and secure implementation, some examples of recent work include implementation of secure key management, passwordless authentication, m2m authentication, sandboxing and compute/network/storage isolation
  2. Identify security gaps and vulnerabilities in ClickHouse Cloud and OSS, triage a wide range of vulnerabilities reported via our bug bounty program, responsible disclosure, GitHub Issues covering web, API and server - client assets including low level memory issues like heap or buffer overflows
  3. Improve and develop security assurance activities - pentests, vulnerability assessments, bug bounty programs, fuzzing
  4. Drive implementation and usage of engineering security tools - static, dynamic code analysis, dependency checks, code licensing compliance (working knowledge of Snyk, Semgrep, GitHub CodeQL)
  5. Develop processes, tooling and automation to scale security processes and mitigate risks to the business

Skills

Required

  • Experience supporting engineering and product implementation efforts by performing threat assessments, assurance activities, advisory as well as, in some cases, implementation work across distributed systems covering web, API, client/server assets
  • Strong knowledge of and experience with one or more cloud service providers (e.g. AWS, GCP, Azure), Kubernetes, Cilium
  • Experience implementing and operating engineering security tools and processes (e.g. static / dynamic code analysis, software composition analysis, SBOM, OWASP SAMM, client and network fuzzing tools)
  • Significant development and automation experience, ability to work with C++ code
  • Security as code mindset, with focus on solving problems with automation and scale in mind

Nice to have

  • BS, MS, or PhD in Computer Science or related field
  • Previous contributions to open source projects
  • Security or cloud related certifications (AWS, GCP, Azure)

What the JD emphasized

  • threat modeling
  • assurance
  • secure implementation
  • security gaps
  • vulnerabilities
  • bug bounty program
  • responsible disclosure
  • low level memory issues
  • pentests
  • vulnerability assessments
  • bug bounty programs
  • fuzzing
  • static, dynamic code analysis
  • dependency checks
  • code licensing compliance
  • Snyk, Semgrep, GitHub CodeQL
  • engineering security tools
  • automation
  • scale security processes
  • mitigate risks