Principal Product Researcher, Endpoint Security Posture Management
H
HuntressCybersecurity
Remote USFull-TimePrincipal
Salary210000 - 230000 USD per year
Apply NowOpens the employer's application page
Job Details
- Required Skills
- Artificial IntelligenceC++Go
Requirements
- Expert experience in configuration management across endpoint platforms - including firewalls, application control, attack surface reduction, & vulnerability management solutions
- Experience reverse engineering
- Experience leveraging AI to generate security outcomes
- Experience building AI agents for security research & innovation
- Expert-level security engineering & vulnerability management skills + experience
- Expert skills in performing security assessments, vulnerability testing, and risk analysis on endpoint devices
- Demonstrated experience producing proofs of concept
- Programming Skills (C/C++/Go)
- Passion for the MSP community
- Security conference presenter
- Security community educator & advocate
Responsibilities
- Lead the security Capabilities we bring to market, owning the layered defense strategy gained by combining multiple data sources
- Convert application and endpoint vulnerability research + findings into actionable preventive and remediation actions by generating security software engineering requirements
- Translate CVE & vendor hardware/software vulnerability research into security product development
- Reverse engineer operating system (OS) components to identify + action OS control mechanism opportunities for security product development
- Research vulnerability management automation opportunities to scale patching + security fixes for all operating systems and applications across millions of endpoints
- Report on health and security posture for millions of endpoints across tens of thousands of varied environments
- Iterate high-impact security posture baselines that align security posture to reduce & remediate risk
- Measure endpoint protection software solution effectiveness at reducing risk, closing security gaps & decreasing attacks/access
- Design, architect, and build vulnerability management scanning infrastructure and tools
- Document research findings through technical write-ups, advisories, internal reports, and blogs.
View Full Description & ApplyYou'll be redirected to the employer's site