Who We Are
At OKX, we believe that the future will be reshaped by crypto, and ultimately contribute to every individual's freedom.
OKX is a leading crypto exchange, and the developer of OKX Wallet, giving millions access to crypto trading and decentralized crypto applications (dApps). OKX is also a trusted brand by hundreds of large institutions seeking access to crypto markets. We are safe and reliable, backed by our Proof of Reserves.
Across our multiple offices globally, we are united by our core principles: We Before Me, Do the Right Thing, and Get Things Done. These shared values drive our culture, shape our processes, and foster a friendly, rewarding, and diverse environment for every OK-er.
OKX is part of OKG, a group that brings the value of Blockchain to users around the world, through our leading products OKX, OKX Wallet, OKLink and more.
- Manage vulnerabilities discovered by SAST and DAST, complete the closed loop, and improve the overall security of the company.
- Integrate security requirements according to business scenarios, optimize vulnerability scanning and repair processes, and improve processing efficiency.
- Reproduce vulnerabilities in complex environments, optimize various SOPs at vulnerability management and security coding levels, and complete implementation.
- Develop and maintain SAST, DAST, IAST scanning rules and suppression rules, including but not limited to Fortify, CodeQL, Xray, AWVS, etc
- Perform comprehensive code audits to improve vulnerability coverage, accuracy, etc., to ensure code security and compliance.
- Provide technical guidance and support to team members on security best practices
- At least 5 years of experience in DevSecOps or related fields.
- Proficient in the principles and practices of SAST, DAST, and IAST.
- Have rich experience in using various scanning engines for code auditing and scanning rule development.
- Have a deep understanding of microservice structure, familiar with vulnerability reproduction in microservice rack/RPC scenarios.
- Understand service link(service-to-service invocation chains) tracing technology .
- Able to reproduce and resolve complex environmental vulnerabilities identified by SAST, DAST, and IAST.
- Solid Java and/or Golang development skills.
- Excellent problem-solving skills and attention to detail.
- Good communication and teamwork skills.
Nice to have
- Familiar with application layer and Cloud Native architecture, as well as related security governance work.
- Possess certification in relevant safety disciplines.
- Have experience in developing open source security tools, or have participated in the development and optimization of vulnerability scanning engines and governance platforms.
- Familiar with common web application architecture and its security bugs, with solid experience in vulnerability reproduction and vulnerability repair
Perks & Benefits
- Competitive total compensation package
- L&D programs and education subsidy for employees' growth and development
- Various team building programs and company events
- Wellness and meal allowance
- Comprehensive healthcare schemes for employees and dependants
- More that we love to tell you along the process!
#LI-DY #LI-ONSITE