המקום בו המומחים והחברות הטובות ביותר נפגשים
Job Category
Job Details
Job Duties: Implement and maintain code scanning tools to automate security checks. Assess and enhance the security architecture of our systems, identifying and mitigating potential risks. Design and implement security controls, such as authentication, authorization, encryption, and monitoring. Identify and track vulnerabilities in software dependencies, libraries, and third-party components and develop and execute vulnerability remediation plans, ensuring timely fixes. Establish and enforce security policies, standards, and best practices to ensure compliance with industry regulations and company requirements. Automate compliance checks and reporting and set up and manage security monitoring tools and systems to detect and respond to security incidents in real-time and generate regular security reports and metrics for management. Develop incident response plans and participate in security incident investigations and resolution. Implement security controls within IaC scripts and templates to secure cloud infrastructure. Automate security checks for cloud resources and configurations and provide security training and guidance to development and operations teams. Foster a security-aware culture within the organization and maintain detailed documentation of security processes, configurations, and incidents.
Minimum Requirements: Bachelor’s degree (or its foreign degree equivalent) in Computer Science, Engineering (any field), or a related quantitative discipline, and five (5) years of progressively responsible experience in the job offered or in any occupation in a related field.
A related technical degree required (Computer Science, Engineering (any field)).
Special Skill Requirements: (1) Static Application Security Testing (SAST); (2) Dynamic Application Security Testing (DAST); (3) Vulnerability Assessment; (4) SDLC Maturity Model; (5) Secure Code Review; (6) OWASP Top 10, SANS Top 25, PCI, OWASP Application Security Verification Standards; (7) Secure SDLC Controls; (8) DevSecOps/DevOps; (9) Secure SDLC Methodologies ; (10) Checkmarx; (11) Fortify; (12) Burp Suite; (13) CI/CD Pipeline; and (14) Static Application Security Testing (SAST). Any suitable combination of education, training and/or experience is acceptable.
If you require assistance due to a disability applying for open positions please submit a request via this
Posting Statement
does not accept unsolicited headhunter and agency resumes.
משרות נוספות שיכולות לעניין אותך