Job Openings

Apply for Security Engineer I

Please fill out the form below and click Submit to submit your application for consideration. Fields with an asterisk (*) are required.

Summary
Title:Security Engineer I
ID:1049
Department:Internal Systems Development
Location:Houston, TX
Resume
* Resume:
Supported formats: Word, PDF, RTF, Text, and HTML.
  - or Upload from:
 
Contact Information
* Name:
* Address 1:
Address 2:
* City:
* State:
* Zip:
* Phone:
* Email:
Attachments
Cover Letter:
You can type in a Cover Letter or Copy/Paste from an existing document.
General Base Question
* What is the best phone number where you can be reached?:


* What is the best time to call you?:


* Desired Salary:


* Are you located in Houston area? (yes/no):


* Are you located in the Houston area or willing to relocate?:


* Where did you learn about this opening?:
I am a current cPanel employee   Third party recruiter   Employee referral   cPanel's job site   External job board    Other


If you were referred by a cPanel employee, recruiter, or external job board, please type the name.:


* Are you currently authorized to work in the United States on a full-time basis for any employer?:


Security Engineer Questions
Please answer the following questions to the best of your ability, using the level of detail you feel is appropriate.
* What does CGI stand for?:
Computer Generated Imagery
Common Gateway Interface
Computer General Interrupt
Cant Get In
None of the above
* What are the core principles of information security?
* What is the difference between authentication and authorization?
* Which port is typically used for encrypted IMAP traffic?:
143
443
110
993
995
None of the above
* Besides firewalls, what other devices are used to enforce network boundaries?
* What information security challenges are faced in a cloud computing environment?
* Which port is typically used for ping?:
80
123
443
993
None of the above
* In your opinion, what are the top five information security threats facing an organization like cPanel?
* Can you give me an example of cross-site scripting? How would you protect against it?