refresh

Trending Companies

Trending

Jobs

JobsMotorola Solutions

Senior Software Security Engineer

Motorola Solutions

Senior Software Security Engineer

Motorola Solutions

Krakow, Poland, More...

·

On-site

·

Full-time

·

1w ago

Benefits & Perks

Healthcare

Equity

Flexible Hours

Remote Work

Healthcare

Equity

Flexible Hours

Remote Work

Required Skills

Linux

Docker

Kubernetes

Threat modeling

SAST

DAST

IAST

SCA

Root cause analysis

CI/CD

AWS

Azure

Google Cloud

Company Overview

At Motorola Solutions, we believe that everything starts with our people. We’re a global close-knit community, united by the relentless pursuit to help keep people safer everywhere. We build and connect technologies to help protect people, property and places. Our solutions foster the collaboration that’s critical for safer communities, safer schools, safer hospitals, safer businesses, and ultimately, safer nations. Connect with a career that matters, and help us build a safer future.

Department Overview

The Senior Software Security Engineer will be responsible for analysing software designs and implementations from a security perspective, identifying and proposing remediations to security issues throughout the software development lifecycle (SDLC).

Job Description:

This role is primarily hybrid, with occasional travel to our Krakow office.

Responsibilities

Security Design and Implementation

  • Perform threat modelling, risk assessments, and architecture reviews to identify and mitigate risk.

  • Support the engineering teams on definition on detailed security requirements to meet compliance requirements and industry best practices.

  • Perform security code reviews looking for potential security vulnerabilities.

  • Act as a subject matter expert to advise and answer questions from engineering and compliance teams on technical product security matters.

  • Security Testing

  • Define and oversee the deployment of Software Composition Analysis (SCA) tools to compile SBOMs of software components, helping to identify known vulnerabilities and license compliance violations.

  • Define and oversee the deployment of automated security testing tools into CI pipelines, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Secret Detection scanning tools.

  • Manual penetration testing of web applications (backend and frontend).Manual penetration testing skills in the domains of cloud infrastructure, embedded/OS or mobile are desirable.

  • Write custom scripts or unit test cases to check for vulnerabilities or broken/missing security controls.

  • Recommend improvements to existing security scanning tools and processes, and propose new ones.

Vulnerability Management

  • Periodically triage the findings from the automated security scanning tools.
  • Validate potential security vulnerabilities to determine whether they are actual true positives, or false positives (i.e. non-applicable) in the product context. Write proof of concept exploits when necessary to achieve this.
  • Assess the risk of vulnerabilities and threats in order to help the business determine their remediation priority order.
  • Communicate the identified security issues to engineering and compliance stakeholders, and manage them throughout the SDLC process to ensure they are properly addressed.

SDLC and Dev Sec Ops Integration

  • Establish and maintain secure coding standards, baseline product security requirements and more general best practices to provide guidance to development teams.
  • Assist the program area with implementing a secure Continuous Integration/Continuous Delivery (CI/CD) pipeline utilizing Dev Sec Ops principles and practices to increase automation.
  • Implement automated security controls as part of CI/CD pipelines.

Incident Response and Compliance

  • Support product security incident response processes, including root cause analysis (identify the affected product components, data, and the overall impact level) and definition of mitigation strategies.
  • Define clear criteria and protocols for security incident response.
  • Conduct post-incident analysis to compile lists of lessons learned, and measures to prevent similar incidents from reocurring, and refine response strategies.
  • Monitor emerging security threats, vulnerabilities, and trends to proactively investigate, remediate, and integrate new protections.
  • Ensure products comply with relevant security standards, certifications, and regulations (e.g., OWASP, NIST).

Basic Requirements:

Required Qualifications

Experience and Education

  • 5+ years of experience in Security Engineering with a focus on product security and/or application security.
  • Bachelor’s degree in Computer Science, Information Security, or a related technical field.
  • Good verbal and written English communication.

Technical Skills

  • In-depth knowledge of Linux and Docker container-based infrastructures, including their orchestration (e.g. Kubernetes).
  • Working knowledge of techniques, standards, and state-of-the-art authentication and authorization technologies, applied cryptography, security vulnerabilities and remediations.
  • Significant software development experience. Experience in Go (our main backend language), Typescript/Javascript, C/C++, Python and Bash is desirable.
  • Working knowledge of web-related protocols and technologies (HTTP, REST APIs, DOM, CSP), networking protocols (IP, TCP, UDP), and security protocols (TLS).
  • Experience in performing threat modeling, with a good grasp of common threat vectors and frameworks.
  • Strong knowledge of security principles, best practices, and industry standards, such as NIST, ISO 27001, and CIS Critical Security Controls, OWASP ASVS and Testing Guides.
  • Familiarity with industry-standard security frameworks such as OWASP and NIST.
  • Experience with security tools such as SAST, DAST, IAST, and SCA.
  • Exceptional analytical and investigative skills, with hands-on experience in root cause analysis.
  • Knowledge of current and emerging threats and techniques for exploiting security vulnerabilities.
  • Experience with CI/CD pipeline, security tools integration, and secure SDLC.
  • Experience with cloud-based infrastructure (AWS, Azure, or Google Cloud), and on best practices on how to secure cloud environments.

Desirable Qualifications

Advanced Expertise

  • Familiarity with security considerations for AI/ML systems is desirable.
  • Understanding of distributed systems design, implementation and operation.
  • Understanding of privacy threats and controls, including on how to adapt generic best practices to specific scenarios in the product by providing detailed specifications to stakeholders.
  • Exploit development experience, and good understanding of the necessary conditions to trigger different vulnerability types, and the maximum impact achievable.
  • Experience with enterprise log collection and analysis platforms (e.g., Splunk, OSQuery).

Education and Certifications

  • Master's degree or equivalent experience preferred.
  • Security certifications are a plus, including OSCP, OSEE, SANS/GIAC, CCSP, and CISSP.

Soft Skills and Leadership

  • Excellent verbal and written communication, with the ability to translate complex security concepts to technical and non-technical stakeholders.
  • Demonstrated ability to design, document, and implement new security processes.
  • Experience in a high-growth technology environment or SaaS business.
  • Ability to remain calm under pressure, especially during incidents or audits.

In return for your expertise, we’ll support you in this new challenge with coaching & development every step of the way. Also, to reward the hard work, you’ll get:

  • Contract of Employment (UoP)

  • Private medical coverage, Multisport

  • Life insurance (two annual incomes),

  • Employee Stock Purchase Plan – 15% discount for buying Motorola’s Stock units,

  • Employee Pension Plan – 3,5 % of the month’s salary gross, which goes to the retirement account

  • IP Tax Relief (up to 50%)

  • Yearly salary increase (depends on individual performance)

  • Yearly bonus (depends on company performance)

  • UK working hours (working day between 10-18),

  • 8 hours working day (30 minutes lunch break included).

  • Hybrid/ remote work

Travel Requirements:

Under 10%###
Relocation Provided

None

Position Type:

Experienced

Referral Payment Plan

Yes

Company

Motorola Solutions Systems Polska Sp.z.o.o

EEO Statement

Motorola Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion or belief, sex, sexual orientation, gender identity, national origin, disability, veteran status or any other legally-protected characteristic.

We are proud of our people-first and community-focused culture, empowering every Motorolan to be their most authentic self and to do their best work to deliver on the promise of a safer world. If you’d like to join our team but feel that you don’t quite meet all of the preferred skills, we’d still love to hear why you think you’d be a great addition to our team.

Total Views

0

Apply Clicks

0

Mock Applicants

0

Scraps

0

About Motorola Solutions

Motorola Solutions

Provides safety and security products and services.

Chicago

Headquarters

Reviews

4.1

27 reviews

Work Life Balance

3.6

Compensation

4.1

Culture

4.4

Career

4.5

Management

3.6

85%

Recommend to a Friend

Pros

Competitive compensation packages with equity

Opportunities for continuous learning and growth

Cutting-edge technology stack and interesting technical challenges

Cons

Fast-paced environment with tight deadlines

Internal politics in some teams

Organizational changes and restructuring can be disruptive

Salary Ranges

43 data points

Mid/L4

Senior/L5

Mid/L4 · Data Relationship Manager

1 reports

$143,231

total / year

Base

$110,178

Stock

-

Bonus

-

$143,231

$143,231

Interview Experience

3 interviews

Difficulty

3.0

/ 5

Duration

14-28 weeks

Offer Rate

33%

Experience

Positive 33%

Neutral 67%

Negative 0%

Interview Process

1

Phone Screen

2

Technical Interview

Common Questions

Technical coding questions

System design concepts

Programming fundamentals