Login Sign Up
🔔 FCM Loaded

Product Security Specialist

HCLSoftware

3 - 4 years

Noida

Posted: 20/03/2026

Getting a referral is 5x more effective than applying directly

Job Description

Send resumes to: mounika-d@hcl-software.com

Location: Noida

Exp: 3+ years


About the Role

We seek an actively-minded and technically, technologically experienced, (3-4 years) PSIRT Engineer. The preferred candidate must possess an effective background in software development, security incident response, and code review to detect the vulnerabilities of the product codebases and third-party integrations.

Key Responsibilities

  • Engage in product vulnerability-related security incident response, detection, to resolution.
  • Review code routinely to find and prioritise possible weaknesses or bad patterns, or insecure design implementations.
  • Evaluate both internal/external vulnerability reports (e.g., bug bounty programmes, disclosures by customers, vulnerability scanners).
  • Work with development teams to reproduce, evaluate, and fix reported vulnerabilities.
  • Keep the PSIRT process running - monitoring CVEs, arranging vulnerability reporting, and creating advisories.
  • Lessons learned and root cause analysis of support to improve post-incident.
  • Keep abreast of the most recent vulnerability trends and strategies of attacks and defence.

Required Skills & Experience

  • 3-4 years working in Product Security, Application Security, or PSIRT.
  • Good knowledge of C, C++, Java, Python, or Go (capable of conducting reviews).
  • Familiarity with the use of static and dynamic code analysis tools (e.g., App Scan , Klockworks ).
  • Understanding of software vulnerability types (e.g. buffer overflows, XSS, SQLi, CSRF, race conditions).
  • Practical implementation of CVSS scoring, CVE management and coordinated disclosure.
  • Knowledge in threat modelling and secure development lifecycle (SDLC).
  • Sound knowledge of network protocols, APIs and operating systems (Linux/Windows).
  • Good communication and documentation expertise to carry out connections between the engineering and product teams.

Preferred / Nice-to-Have

  • Work with open-source vulnerability scanning tools (e.g., Snyk, Dependency-Cheque, Trivy).
  • Reverse engineering/binary analysis knowledge (e.g. Ghidra, IDA Pro).
  • Introduction to incident management models (FIRST, ISO 30111, ISO 29147).
  • Certifications such as CEH or Security+ are an advantage.
  • Past input to security advisories or open source PSIRT programmes.

Soft Skills

  • Critical thinking and detailing.
  • Close cooperation and interaction among cross-functional teams.
  • Effective prioritisation and handling of several incidents.
  • Love for learning and never ending product security.

Services you might be interested in

Improve Your Resume Today

Boost your chances with professional resume services!

Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.