Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Amazon Security Engineer Stores Application 
United States, Texas, Austin 
72104839

15.05.2024
DESCRIPTION

Key job responsibilities
* Creating, updating, and maintaining threat models for a wide variety of software projects
* Manual and Automated Secure Code Review, primarily in Java, Python and Javascript
* Development of security automation tools
* Adversarial security analysis using cutting-edge tools to augment manual effort
* Security training and outreach for internal development teams
* Security architecture and design guidance
* Independently solve security problems that require novel methods or approaches
* Influence your team’s and partners’ process, priorities, and choices to improve outcomesDiverse Experiences
Amazon Security values diverse experiences. Even if you do not meet all of the qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying.Training & Career Growth
We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, training, and other career-advancing resources here to help you develop into a better-rounded professional.Work/Life Balance
Austin, TX, USA

BASIC QUALIFICATIONS

- 3+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience
- Bachelor's degree
- Experience with programming languages such as Python, Java, C++
- Knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, or application security


PREFERRED QUALIFICATIONS

- Experience applying threat modeling or other risk identification techniques or equivalent
- Knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits or equivalent
- You have a strong application security background with a focus on scalable solutions.