Organisation Unit Purpose
The unit's primary purpose is to Design Engineer & eventually Embed practical & balanced cyber / information security principles / patterns / controls into all products and platforms. Conduct security assessments gap analysis provide remediation to the relevant squads / stakeholders.
Job Purpose
Primary / General Job Purpose :
- Encourage Shift Left Mindset - Proactively embed security requirements by influencing implementation of security & privacy patterns from the start of the development cycle
- Implement via Influence - Influence stakeholders such as Product Owners Solution Architects Developers Testers Engineers & others to include security patterns into features epics and stories in order to build secure innovative & superior digital products for customers and employees
- Assessments Perform security assessment and perform gap analysis to provide appropriate remediations to the teams for implementing the fixes.
Key Skills Web Application Security Security Code review API security Underlying infrastructure security Integration Security Database Security Secure Configuration Review.
Tools and Technologies Burp Suite Postman Tenable Nessus Checkmarx SAST GitHub and good knowledge about monolithic and microservice architecture and pipeline driven security.Experience with following Components
Technical Requirements
Web Application Security Owasp top 10 CVSS etcSecurity Code Review manual code review in Git etcAPI Security Review Open shift container review etc.Database Security Requirements to enhance security on DatabaseWeb Server Security Requirements to enhance security on the web serverConfiguration Review has performed different configuration reviews and should have found good misconfigurations in the system.Integration review How the application connects with different systems performed security review on those integrations.Transport Layer Security How communication channels are secured and understanding of the Transport layer security mechanisms and controls.Soft Skills
Ability to collaborate with multiple stakeholders and manage their expectations from a security perspectiveHolistic thinking; must balance security and functionality using practical demonstrable examples. Must also contribute to and implement good architecture principles to lower technical debtAssertive personality; should be able to hold her / his own in a project board or work group settingSuperlative written and verbal communication skills; should be able to explain technical observations in an easy-to-understand mannerAbility to work under pressure and meet tough / challenging deadlinesInfluencer- must be able to convince various stakeholders (internal IT Teams C-Level execsRisk & Audit) of why a certain observation is a concern or notStrong understanding of Risk Management Framework and security controls implementation from an implementer standpointHas strong decision making planning and time management skills.Can work independently.Has a positive and constructive attitude.Education
Bachelors degree in a computer-related field such as computer science cyber / information security discipline physics mathematics or similar (Essential)General Information Security : OSCP CEH CISM / CISA or similarGeneral Cloud Security : CCSK / CCSP or similarSpecific Cloud Security : Azure Security or similarNetwork Security : CCNA CCNP CCIE Certified Kubernetes Security SpecialistExperience (Essential)
Must have minimum 3 years of experience in an information security function with good background in information technology stakeholder management and people managementKnowledge & Skills - Technical Functional & Managerial
Expert at the Web Application Security testing in depth testing skillset and ability to bypass weak implementation for attacks ability to bypass WAF for attack scenarios such as XSS SQL Injection etc. (Essential)Good understanding of Microservice based architecture (Technical) (Essential)Good hands-on experience solutioning technology architectures that involve perimeter protection core protection and end-point protection / detection & API / Micro services Security (Essential)Experience working in a DevOps environment with knowledge of Continuous Integration Containers DAST / SAST tools and building Evil Stories (Technical) (Essential)The Analyst / Engineer should be able to understand how different systems work and what security controls are implemented in such integrations. (Essential)The Analyst / Engineer should be capable in understanding the hardening standards creating one if not available and perform the testing against the hardening standards. (Essential)The Analyst / Engineer should be capable of assessing security flaws in underlying infrastructure and the connected components. (Essential)The Analyst / Engineer should be capable of assessing the security flaws in the Transport Layer. (Essential)The Analyst / Engineer has the skill to follow design principles and applies design patterns to enforce maintainable and reusable patterns in the form of code or otherwise.The Analyst / Engineer can understand and interpret potential issues found in source or compiled codeThe Analyst / Engineer has automation skills / capability in the form of scripting or similarThe Analyst / Engineer can attack application and infrastructure assets interpret threats and suggest mitigating measuresAbility to interpret Security Requirements mandated by oversight functions and ensure comprehensive coverage of those requirements via documentation within high level design and / or during agile ceremonies via Evil Stories DesirableThe Analyst / Engineer can propose options for solutions to the security requirements / patterns that provide a balance of security user experience & performance DesirableThe Analyst / Engineer has the skill to discuss and present solutions to other architecture security development and leadership teams. DesirableThe Analyst / Engineer can interpret and understand vulnerability assessment reports and calculate inherent and / or residual risks based on the assessment of such reportsAbility to articulate and be a persuasive leader who can serve as an effective member of the senior management team.Good negotiation skills will be desirable DesirableMust have good judgment skills to decide on an exception approvalAbility to enforce improvements when necessary using Influence rather than Policing measures Superior written and verbal communication skills to effectively communicate security threats and recommendations to technical or non-technical stakeholdersKnowledge of application of Agile methodologies / principles such as Scrum or KanbanBehavioral Competencies - Thinking Related People Related & Self Related (All Essential)
Influencer / Security Evangelist for the Team / SquadPositive & Constructive AttitudeAutonomous worker / Decision MakerGood listenerPatient & Calm during stressful situationsHigh energy individual / MotivatorWin-Win AttitudeHacker / Defense-In-Depth mindsetAnalytical thinkingTeam Player / Interpersonal SkillsEye for detailPersistent & PersuasiveOrganized / StructuredDeadline orientedCompetent and committedPeoples Person; understands stakeholder managementEmpatheticPassionate about architecting smart solutionsInnovator / Out of the box thinkerCollaborative Leadership styleConfident Presenter All EssentialOther Information
Age No barNationality No barGender No bar#J-18808-Ljbffr