Security Engineering Intern (Summer 2018)
The security team at Flatiron Health is a part of an amazing organization full of really smart people and work every day to protect against threats to a business trying to help cure cancer. We create attack driven defenses, not compliance. We are always looking for new ideas and trying to make sure the best ideas rise to the top of the heap. We focus on results and not just debate, in fact we are often architects, designers and engineers, not just advisors. We build credibility through action and results.
We work in a fast-paced, high-information-volume environment with complex domain challenges, which means context is key and there's always more to learn and soak up. We want to know oncology data cold — better than anyone else in the industry — and we believe doing that requires building a culture where we all like coming to work each day. In our culture, decisions are transparent and data-driven, and people are empowered to make waves.
Are you interested in changing the way the oncology world thinks about data?
As a Flatiron Security Engineering Intern you will:
- Review software, discover vulnerabilities, and develop fixes for them.
- Design and develop automatic tests for discovering vulnerabilities in in our products.
- Work alongside a world-class team, defending Flatiron against real attackers.
- Learn more about cancer and the day-to-day intricacies of oncology than you can possibly imagine
- You are attending university, pursuing a BS or MS related to computer science, and will be graduating between December 2018 and June 2019.
- You enjoy discovering and analyzing vulnerabilities in software.
- You are comfortable writing code.
- You want to develop practical application security skills to discover, analyze, and prevent security vulnerabilities.
- You are comfortable in a Unix/Linux environment
- You are enthusiastic about working on a multi-disciplinary team
- You are passionate about our mission to improve healthcare through technology
Bonus points if you…
- Spend your free time looking for bugs.
- Have found vulnerabilities in open source software or bug bounty programs.
- Have played in online offensive competitions (like CTFs).