Product Security Engineer-6 month internship

Fortinet

Stage Sophia Antipolis, Alpes-Maritimes, France Incubateur / Accélérateur
Publiée le
17/04/2026
Contrat
Stage · 4-6 mois
Localisation
Sophia Antipolis, Alpes-Maritimes, France
Taille équipe
Inconnue emp.
Rémunération
Inconnue
Inconnue 0-1 ans exp. Anglais
Missions clés Analyser les solutions de fuzzing existantes. · Architecturer et implémenter un fuzzer pour les protocoles réseau. · Découvrir des vulnérabilités en déployant l'outil sur des produits en direct. · Intégrer l'outil dans le pipeline DAST continu.
Profil recherché 0-1 ans d'expérience · Analyse · Développement · Recherche en sécurité · Intégration
Outils & compétences Dynamic Application Security Testing (DAST), TCP/UDP fuzzer, packet generation, monitoring mechanisms

Le poste en détail

Internship: PSIRT Security Tooling & Protocol Fuzzing (6 months)

Overview

Join our Product Security Incident Response Team (PSIRT) to enhance our automated vulnerability discovery capabilities. This project focuses on expanding our Dynamic Application Security Testing (DAST) toolkit by integrating a high-performance TCP/UDP fuzzer.

Fuzzing is a cornerstone of modern security research, used to uncover critical flaws—such as memory corruption, logic errors, and code injection—by injecting malformed data into network protocols. Your work will directly impact the security of Fortinet products by identifying vulnerabilities before they can be exploited in the wild.

Objectives & Responsibilities

As a Product Security Engineer Intern, you will bridge the gap between software development and offensive security research. Your journey will include:

  • Conduct a deep-dive analysis of existing local and network-based fuzzing solutions.
  • Architect and implement a fuzzer tailored for Fortinet’s and standard network protocols. This involves: 
    • Generation & Mutation: Creating packet generation logic based on product-specific protocol specifications.
    • Instrumentation: Developing mechanisms to monitor target products for crashes, hangs, or unintended behaviors.
  • Vulnerability Discovery: Deploy your tool against live products to detect regression of known flaws and discover "zero-day" vulnerabilities.
  • Integration: Ensure the tool is modular and ready to be integrated into our continuous DAST pipeline.