Security Engineer (2019 New Graduate)
The security team at Flatiron works every day to protect the company against threats so that our employees can focus on helping to cure cancer. We create attack driven defenses, not compliance. We are always looking for new approaches to our work and have cultivated a meritocracy where the best ideas rise to the top of the pile. We focus on results and not just debate: in fact, we are often architects, designers and engineers (not just advisors). We build credibility through action and results.
We work in a fast-paced, high-information-volume environment with complex domain challenges, which means context is key and there's always more to learn and soak up. We want to know oncology data front to back — better than anyone else in the industry — and we believe accomplishing that requires building a culture where we all like coming to work each day. In our culture, decisions are transparent and data-driven, and people are empowered to make waves.
Are you interested in changing the way the oncology world thinks about data?
As a Flatiron New Grad you will:
- Review software, discover vulnerabilities, and develop fixes for them
- Design and develop automatic tests for discovering vulnerabilities in in our products
- Work alongside a world-class team, defending Flatiron against real attackers
- Learn more about cancer and the day-to-day intricacies of oncology than you can possibly imagine
- You are graduating between December 2018 and June 2019 with a BS or MS in computer science or related field
- You enjoy discovering and analyzing vulnerabilities in software
- You are comfortable writing code but want to learn even more
- You want to develop practical application security skills to discover, analyze, and prevent security vulnerabilities
- You are comfortable in a Unix/Linux environment
- You are enthusiastic about working on a multi-disciplinary team
- You are passionate about our mission to improve healthcare through technology
Bonus points if you…
- Spend your free time looking for bugs
- Have found vulnerabilities in open source software or bug bounty programs
- Have played in online offensive competitions (like CTFs)