--- layout: job_family_page title: "Vulnerability Research Engineer" --- GitLab is building a research team that will focus on improving GitLab’s security detection capabilities, including SAST/DAST and future products. For more information about our security products, please review: https://about.gitlab.com/direction/secure/ and https://about.gitlab.com/direction/defend/ This team will work directly with the GitLab Security, Development, and Product teams to build, tune and improve the efficacy of GitLab’s of security products that are integrated into GitLab. Vulnerability Research Engineers are responsible for performing deep assessments of software and web application vulnerabilities, tracking exploit code releases and exploitation activities, and the creation of detailed and actionable reports in support of our global commercial and government customers. ## Responsibilities - Dedicate all bandwidth to dogfooding and contributing directly to the Secure and Defend products - Curate an advisory database/dependency scanning database. This is a semi-automatic task that includes auditing/reviewing, editing existing and adding new advisories to the database while, at the same time, trying to automate repetitive tasks away as much as possible. - Build/develop benchmarks to test the efficacy of scanning and detection products - Measure and Improve the efficacy of scanning and detection products over time - Conduct code review of Ruby and Go backend code - Build/develop/improve solutions in the area of static and dynamic analysis - Write detailed technical reports - Assess security product output results and conduct root cause analysis to improve efficacy - Respond to internal and external customer inquiries on vulnerabilities and related topics - This is NOT a Security Operations or Application Security position ## Requirements - 2+ years of direct experience in developing and improving vulnerability detection products in the context of web security - Understanding of software composition analysis - Knowledge about compilers/compiler construction - Experience with source code analysis, static application security testing (SAST), and dynamic application security testing (DAST) - Knowledge about benchmarking for testing the efficacy of scanning and detection products - Experience developing automated web security testing tools - Experience completing code reviews of Ruby and Go backend code - Experience in product development - You have a passion for security and open source - You are a team player, and enjoy collaborating with cross-functional teams - You are a great communicator (written and verbal) - You employ a flexible and constructive approach when solving problems - You share our values and work in accordance with those values ## Nice to haves - Experience with abstract interpretation/ reverse-engineering - Experience with binary analysis ## Levels ### Senior Vulnerability Research Engineer * Leverages security expertise in at least one specialty area * Triages and handles/escalates security issues independently * Conduct security product output reviews and makes recommendations * Great written and verbal communication skills * Screen security candidates during hiring process *** A Senior Vulnerability Research Engineer may want to pursue the [vulnerability security management track](/job-families/engineering/vulnerability-research-manager) at this point. See [Engineering Career Development](/handbook/engineering/career-development) for more detail. *** ### Staff Vulnerability Research Engineer The Staff Vulnerability Research Engineer role extends the [Senior Vulnerability Research Engineer](#senior-vulnerability-research-engineer) role. * Recognized security expert in multiple specialty areas, with cross-functional team experience * Make security product decisions * Provide actionable and constructive feedback to cross-functional teams * Implement security technical and process improvements * Exquisite written and verbal communication skills * Author technical security documents * Author questions/processes for hiring and screening candidates * Write public blog posts and represent GitLab as a speaker at security conferences ## Hiring Process Candidates for this position can expect the hiring process to follow the order below. Please keep in mind that candidates can be declined from the position at any stage of the process. To learn more about someone who may be conducting the interview, find her/his job title on our [team page](/company/team/). - Selected candidates will be invited to schedule a 30 minute [screening call](/handbook/hiring/interviewing/#screening-call) with our Recruiting team - Next, candidates will be invited to schedule an interview with the Vulnerability Research Manager - Candidates will then be invited to schedule interviews with peer Researchers As always, the interviews and screening call will be conducted via a video call. See more details about our hiring process on the [hiring handbook](/handbook/hiring).