Security Engineering Intern (Summer 2019)
The security team at Flatiron Health works every day to protect the company against threats so that our employees can focus on helping to cure cancer. We create attack driven defenses, not compliance. We are always looking for new ways to approach our work and we’ve cultivated a meritocracy where the best ideas rise to the top of the pile. We focus on results and not just debate: in fact we are often architects, designers, and engineers (not just advisors). We build credibility through action and results.
We work in a fast-paced, high-information-volume environment with complex domain challenges, which means context is key and there's always more to learn and soak up. We want to know oncology data front to back — better than anyone else in the industry — and we believe accomplishing that requires building a culture where we all like coming to work each day. In our culture, decisions are transparent and data-driven, and people are empowered to make waves.
Are you interested in changing the way the oncology world thinks about data?
As a Flatiron Security Engineering Intern you will:
- Review software, discover vulnerabilities, and develop fixes for them.
- Design and develop automatic tests for discovering vulnerabilities in in our products.
- Work alongside an amazing team defending Flatiron against real attackers.
- Learn more about cancer and the day-to-day intricacies of oncology than you can possibly imagine.
- You are graduating between December 2019 and June 2020 with a BS or MS related to computer science.
- You enjoy discovering and analyzing vulnerabilities in software.
- You are comfortable writing code but want to learn even more.
- You want to develop practical application security skills to discover, analyze, and prevent security vulnerabilities.
- You are comfortable in a Unix/Linux environment.
- You are enthusiastic about working on a multi-disciplinary team.
- You are passionate about our mission to improve healthcare through technology.
Bonus points if you…
- Spend your free time looking for bugs.
- Have found vulnerabilities in open source software or bug bounty programs.
- Have played in online offensive competitions (like CTFs).