Cultivate security culture with your product technology and business colleagues. Products that have the right security culture will strive to prioritize sustainable controls and driving real risk reduction outcomes. Perform threat modelling with application teams so they adopt our control products and create products that are secure from the start.
Know your product across its breadth and depth. Be fluent in your product’s strategy and roadmap as well as its key investment programs. Identify unfamiliar technology components, capabilities, and business concepts and be self-motivated to learn all about them, applying critical thinking to identify hidden issues along the way.
Learn from your product and cybersecurity teams and share best practice in both directions. Be recognized in your product as the clear point of escalation and subject matter expert for IT Risk and Cyber domains.
Partner and influence across your product’s supply chain. Work collaboratively with product, technology, and business colleagues on an on-going basis for business-as-usual audit and regulatory engagements, risk activities and project initiatives. Work closely with Third Party Oversight teams to ensure effective technology risk management of vendors engaged by technology partners, with a focus on Cloud computing / emerging technologies.
Required qualifications, capabilities, and skills:
Deep understanding of public cloud computing, with a focus on applying controls to secure data, ensure resiliency, and maintain availability.
Proficient in well-architected frameworks for cloud security. Capable of assessing architecture and implementing cybersecurity controls. Experience with cybersecurity patterns and best practices.
Hands-on experience and strong knowledge of one or more cloud platforms such as AWS, and/or Google Cloud Platform, and/ or Azure. Familiarity with Terraform or Cloud Formation is desirable.
Solid understanding of cloud services, including PaaS, IaaS, and SaaS, as well as Kubernetes solutions (e.g., Anthos, AKS, EKS).
Experience with cloud security posture management, cloud security, cloud security systems, cybersecurity systems
Good understanding of Security Operations Center (SOC) operations and cloud-native monitoring systems. Ability to read logs, understand detection rules, and propose effective threat mitigations.
Knowledge of security best practices and DevSecOps methodologies. Familiarity with SAST (Static Application Security Testing), DAST (Dynamic Application Security Testing), and MAST (Mobile Application Security Testing) systems is desirable.
Understanding of network security concepts, including cloud networking, network design, and firewalls etc.
Strong understanding of threat modeling and the ability to identify vulnerabilities in architectural design.