The point where experts and best companies meet
Share
* Strong programming experience in Java or Go (at least 2 years).
* Knowledge of industry standards regarding vulnerability management (i.e., Common Vulnerability Scoring System (CVSS), and Common Vulnerability and Exposures (CVE)).
* Experience with static and dynamic code analysis tools (e.g. OWASP ZAP).
* Knowledge of secure coding practices and frameworks (e.g., Spring Security, JWT, OAuth).
* Knowledge and experience with secure deployment of applications within a cloud environment.
* Knowledge of Agile methodologies.
* Experience in vulnerability management and penetration testing.
* Understanding of cryptographic principles and secure communication protocols.
* Familiarity with container security (Kubernetes, Red Hat OpenShift Container Platform).
* Ability to manage the security vulnerabilities and risks across the organization including identifying, and supporting application/system owners to manage risks and remediate vulnerabilities.
* Knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, threat management, and incident management.
These jobs might be a good fit