With hundreds of products spanning many different vertical markets, your next project could be anything from static and dynamic analysis of a multi-node Java infrastructure, to writing a fuzzer for an undocumented network protocol or the grammar of a new programming language, to analysis and reverse engineering of firmware used in the thousands of servers supporting our cloud services. Creativity is highly valued; being able to find novel bugs and stitch them together to create something greater than the sum of their parts is essential in this role.
This is not your run-of-the-mill pentesting gig where you grind out web application assessments week in week out. The EHT is a dedicated security research group who invest the same amount of time and effort into breaking a product as you would expect from a state-sponsored APT.
Unlike an APT team, however, we’re not only invested in finding bugs but also making sure they are fixed correctly and don’t happen again. We don’t just need people who can find CVSS 10s, we need people who can use their skills and share their expertise to effect meaningful change across the company.
A successful candidate must have genuine excitement for and interest in security, as well as the desire to share knowledge and help others learn. Your work will benefit thousands of Oracle engineers worldwide and shape the future of product security within one of the largest software companies in the world.
Role’s core responsibilities:
1. Scope and execute security assessments across a broad range of on-premise and cloud services; develop proof-of-concept code or end-to-end exploits for bugs you’ve identified.
2. Create testing tools to help engineering teams identify weaknesses in their own code.
3. Collaborate with engineering teams to help them triage and fix security issues, identifying systemic security weaknesses to create secure coding guidance that will educate all engineering teams within Oracle.
4. Produce documentation, presentations and supporting material to deliver your findings to senior figures within the development organisation and your own management chain.
Career Level - IC4
Target profile and skillset:
5. 8+ years industry experience in a software/product assessment or penetration testing role.
6. Proficiency reviewing code written in a variety of programming languages, including at least one of C, C++, Java or JavaScript.
7. Extensive experience of vulnerability research and exploit development on Linux or Windows.
8. Experience using common software security assessment tools in the following categories:
9. Reverse Engineering (. IDA Pro/Ghidra/Radare2)
10. Network protocol analysis (. Wireshark/tcpdump)
11. Debugging (. gdb, WinDbg, Intel Pin)
12. Static code analysis (. Fortify SCA, Coverity, SonarQube)
13. Fuzzers and instrumentation (. Jazzer /AFL/Boofuzz/AddressSanitizer)
14. Web Application assessment (. BurpSuite )
15. Experience of creating new tools and scripts for novel assessment targets and vulnerability classes
16. Experience with threat modelling and architecture analysis of complex applications.
17. Extensive knowledge of common vulnerabilities in different types of software and programming languages, including:
18. How to test for and exploit them
19. Real world mitigations that can be applied
20. Familiarity with vulnerability classification frameworks (. OWASP Top 10)
Desirable Skills/Qualifications
21. Bachelor’s or Master’s degree in Computer Science or related field (. Electrical Engineering)
22. Experience working in a large cloud or Internet software company
Required Soft Skills
23. Aptitude for self-study, setting and achieving long term goals (for example, learning an unfamiliar programming language)
24. Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff
25. Excellent organizational, presentation, verbal and written communication skills