As Acronis is dedicated not just to Cyber Protection but to the general protection of its potential and current employees, recruitment and onboarding process are being held online during the current global COVID-19 situation.
Acronis leads the world in cyber protection - solving safety, accessibility, privacy, authenticity, and security (SAPAS) challenges with innovative backup, security, disaster recovery, and enterprise file sync and share solutions that run in hybrid cloud environments : on-premises, in the cloud, or at the edge.
Enhanced by AI technologies and blockchain-based data authentication, Acronis protects all data, applications and systems in any environment, including physical, virtual, cloud, and mobile.
With dual headquarters in Switzerland and Singapore, Acronis protects the data of more than 5 million consumers and 500,000 businesses in over 150 countries and 20 languages.
People entrust Acronis with their data. We are responsible for keeping it safe and this constitutes the essence of the application security researcher job.
The application security team works to make Acronis applications more secure against all kinds of threats. You will work with good guys on their responsible disclosure.
You will find security bugs before bad guys do it. Together with the development team, you'll change development processes and practices to ensure that such kinds of bugs will never appear in our code again.
You will monitor the attacks and respond to them. You will create novel solutions to detect and advanced approaches to protect
Penetration test of new featuresWork with the Infrastructure Security and Security Compliance teams on projects like security hardening of existed
components.Helping other security teams with expertise, knowledge, and advice
SKILLS & EXPERIENCE :
Suggest right fixes and possible bypasses(Windows Security) Your opinion about LPE from Admin to the System userHow to count possible compromised accounts?
To write a simple exploit or a few lines of code that allows checking some kind of attacking vector
WE OFFER :