What You’ll Do
- Work with our bug bounty triagers to validate incoming reports
- Provide high-quality root cause analysis of triaged vulnerabilities
- Provide actionable advice and security guidance to engineers to remediate vulns within SLA
- Create one-click POCs to facilitate vuln fix verification and enable regression testing of known vulns
- Help drive quality engagement on Uber’s public bug bounty program
- Help define targets and organize live hacking events a few times a year
What You’ll Need
- Hands-on experience discovering, validating and fixing common web vulnerabilities (e.g., IDOR, XSS, SSRF, CSRF, RCE, etc.)
- Programming skills in at least one of: Go, Java, Python, NodeJS, etc.
- Ability to communicate ideas and proposals concisely
- Ability to distill complex security problems and drive towards creative solutions
Bonus Points If
- Prior bug hunting and/or bug triage experience
- Experience performing threat modeling, design and code reviews to assess security implications and requirements for the introduction of new systems and technologies
- Experience building out integrations with open source scanners and/or vendor products
About the Team
We are a team of 10X engineers who lead the principled vulnerability discovery initiative at Uber. We ensure that code built and/or deployed at Uber adheres to company-wide security standards and is devoid of known security vulnerabilities.
To that end, we build and deploy top-notch taint tracking systems leveraging control-flow and data-flow analysis techniques to scan and report new security findings in over 5,000 services.
In addition, we crowdsource security intelligence via our best in class Bug Bounty program, red team exercises, as well as manual and automated security audits.
We codify the latest security breakthroughs into custom queries, which we then deploy across our fleet of advanced security scanners. Our constantly increasing corpus of security queries enables us to perform automated, systematic and comprehensive security analysis across all of Uber’s applications and services.
Finally, we evaluate and deploy 3rd party security scanners to scan our internal and external perimeter for known CVEs and CWEs. We then leverage automation to apply patches consistently throughout our fleet of mobile devices, network devices, laptops, servers, containers, etc.