VipraTech Labs

1 Job openings at VipraTech Labs
Security Engineer kota,rajasthan,india 2 years None Not disclosed On-site Full Time

Company Description VipraTech Labs is a forward-thinking technology startup specializing in end-to-end product development, security, automation, and AI-driven workflows. The company builds complete solutions, from backend to frontend, with a focus on secure, testable, and scalable code. VipraTech designs and delivers efficient products and tools while prioritizing automation of operations and AI-enhanced innovation. The team is committed to working closely with startups across regions such as NZ, AUS, SEA, Middle East, EU, and the US, offering personalized, hands-on partnership with a focus on accountability and ROI. VipraTech also invests in nurturing talent, particularly in core development, AI, and cybersecurity. Role Description As a Security Engineer – Python (AppSec Tooling & Integrations) you will turn security research and real-world testing needs into reliable, reusable Python automation . You’ll build scripts/services/CLIs that automate checks, parse results, and publish normalized findings; wrap third-party scanners and APIs behind clean adapters; and package everything into Dockerized jobs that run predictably in CI/CD and our backend pipelines. You will collaborate closely with team to convert techniques into low-false-positive tooling, add logging/metrics, and document usage so others can operate your work without hand-holding. The role is hands-on and delivery-focused: small PRs, clear acceptance criteria, scope discipline, and readable code with tests and docstrings. You’ll participate in design/code reviews, improve reliability/performance, and help evolve our starter kits and internal libraries. This is an onsite, Kota position with a strong learning culture—expect fast feedback, weekly demos, and growth toward owning modules and mentoring juniors. What you’ll do Build Python scripts, services, and CLI tools to automate security checks, data collection, and reporting. Integrate external tools (scanners/APIs/CLIs) into Dockerized workflows; write Python adapters/wrappers for consistent I/O. Develop parsers/matchers to turn raw outputs (HTTP/JSON/HTML/logs) into normalized findings and lightweight reports. Orchestrate jobs (scheduling, retries, parallel runs); add logging/metrics and basic error handling. Contribute to secure, maintainable code: small PRs, unit tests, docstrings/READMEs, and simple design notes. Collaborate with security researchers/engineers to translate techniques into repeatable, low-false-positive automation. Support CI/CD by adding linters/tests and packaging your code for reliable, reproducible runs. Participate in code reviews; suggest improvements in performance, reliability, and security hygiene. Qualifications Must-have Python proficiency: solid fundamentals (data structures, OOP, typing), HTTP clients (requests/httpx), parsing (BeautifulSoup/lxml/json/regex), CLI tooling (argparse/click), packaging/virtualenv/Poetry. Web & protocols: HTTP/HTTPS basics, cookies/sessions, headers/CORS, REST/JSON, simple auth flows (tokens/Basic). Security foundations: OWASP Top 10 concepts (XSS/SSRF/SQLi/Auth/IDOR), input validation/encoding, least privilege, secrets handling, logging for security. Tooling & automation: Linux shell, Docker (build, multi-stage, compose), Git/GitHub flow, write Python wrappers/adapters around external tools/APIs. Quality & reliability: unit tests/pytest, reproducible runs, basic error handling/retries, docstrings/README, small PR discipline. Collaboration: clear written communication, comfort with ticketing (Jira/Linear), code reviews, following acceptance criteria and scope. Good-to-have Security tools exposure: Burp Suite (extensions/Intruder), Nmap/NSE, one of ZAP/Semgrep/Trivy/Bandit, secrets scanners. Concurrency & performance: asyncio/threading/process pools; batching, back-pressure; basic profiling. Data & stores: SQLite/Postgres basics, Redis/queues for job orchestration. CI/CD basics: linters (ruff/flake8), formatters (black), simple GitHub Actions or similar. Framework awareness: basic Django/FastAPI (routes, deps, auth), simple service endpoints. Cloud familiarity: fundamentals on any one cloud (AWS/Azure/GCP)—IAM basics, container run, logs/metrics. Networking: ports/protocols, DNS/HTTP debugging, TLS/mitm basics (Burp/mitmproxy). Security mindset: threat modeling lite, reducing false positives, safe handling of test payloads; responsible disclosure etiquette. Plus points: prior bug-bounty write-ups/tools, CTFs, open-source contributions; relevant certs (eJPT, PNPT, OSCP, CEH) are a bonus—not mandatory. Education/Experience Bachelor’s in CS/IT or equivalent or strong portfolio/GitHub demonstrating Python tooling. 0–2 years for entry/junior; we value proof of work over years.