Zivver company
Our next Security engineer is someone who has ethical hacking as a hobby, who thrives on shift lifting, and someone who collaborates and benefits from the world of open source. Sounds like you?
Zivver is a secure communications provider and as such security is super important at Zivver. We continuously strive to improve the security of our product and organizations. To make sure our customers know they can trust us with their most sensitive data we ask several external auditors to review our security measures. This has resulted in many security certifications so far.
You will be part of a small Security team that is responsible for guarding Zivver from various threats. It is our core job to protect the confidentiality, integrity and availability of data. It is your job to prepare Zivver for cyber attacks, inside threats and bad luck. Since Zivver is a scale up, this means you cannot expect a fully operational Security Operations Center. Together with your team you will both be responsible for building the security measures and executing them. You will closely collaborate with the Engineering team and integrate security in the way we work as much as possible.
To be successful in this role you need to be a creative problem solver that can switch between the defensive and offensive mindset.
Hot takes:
What you’ll do:
Benefits:
Expertise you’ll bring:
Soft skills you’ll bring:
If you’re still reading and excited about this role, we welcome your application even if you think you don’t meet all the requirements. We understand that no candidate is perfect, and would love to hear your story. Keen to learn a bit more? Keep reading.
A day at Zivver
You just started your workday when a colleague in the engineering team asks if you could brainstorm with them on how to embed security in the development pipeline. That is interesting, so you quickly plan a meeting for later that morning because you first have to check out a few alerts which need investigating; there appears to be some suspicious behavior going on on the platform. You spend a couple hours on this and are relieved: it was a false alarm. Nevertheless, you found a few easy ways to improve the alerting which can be picked up later this week.
After lunch you have a look at the incoming vulnerability reports. There is one interesting report on a possible bypass of a rate limiter. The report turns out to be valid. You align with your peer and create a follow up ticket for the engineering team.
In the afternoon you attend the Security Weekly Meeting in which the security team comes together to discuss ongoing security concerns. You present the insight you gained by improving the intrusion detection tooling. The team is happy with the progress and asks some critical questions, and you leave feeling motivated and eager to continue working on this.
For the last hour of the day you start investigating the best ways to improve your visibility on the vulnerabilities in the containers and create actionable output for the engineering teams. You want to make sure you have some good ideas before the brainstorm session with the CISO and the DevOps team tomorrow. After work, you head to the roof terrace for a beer, a non-alcoholic beverage, or whatever you prefer and get ready for the Hackathon that you have planned for the evening.