drjobs
Application Security Architect
drjobs Application Security Architect English

Application Security Architect

صاحب العمل نشط

1 وظيفة شاغرة
هذا المنشور غير متاح الآن! ربما يكون قد تم شغل الوظيفة.
drjobs

حالة تأهب وظيفة

سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني
Valid email field required
أرسل الوظائف
drjobs drjobs drjobs
drjobs drjobs
drjobs

حالة تأهب وظيفة

سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني

Valid email field required
أرسل الوظائف

الراتب الشهري

drjobs

لم يكشف

drjobs

لم يتم الكشف عن الراتب

عدد الوظائف الشاغرة

1 وظيفة شاغرة

الوصف الوظيفي

رقم الوظيفة : 1700258

Location: Tempe, AZ

Employment Status: Permanent
Department: IT and Computer

Job description
Summary of This Role

Responsibilities range from auditing code, architecture and databases used in custom-developed web and cloud applications, to testing for common application level vulnerabilities, weaknesses, and providing both vulnerability analysis and development advise for application hardening.
Applicant must possess a strong background in software development, secure coding techniques, secure architecture, software security frameworks, common weaknesses and vulnerability analysis. Candidate should have experience securing web and mobile applications, APIs, micro-services, containers, cloud and cloud-hybrid architectures.

Responsibilities include:

Working with application development and QA teams across multiple products to: Review, evaluate and prioritize vulnerability findings
Provide SME support on secure code implementation, design and architecture.
Threat-modeling & risk analysis
Training
Participate in providing annual OWASP & PCI training for developers
Helps maintain updated Secure Coding Best Practices
Common application level vulnerabilities
Risk Management
Findings/vulnerability prioritization
Mitigation strategy
Controls Evaluation Review, validate, recommend and create standards
Review of open-source development libraries for security risks
Web application firewall (WAF) rule development and implementation
Security technologies review and recommendations

REQUIREMENTS
Qualifications: Bachelors of Computer Science or similar 6 or more years of experience in applying Information Security best practices to Information Technology assets plus 5 or more years of experience with software development.
Experience with static and dynamic vulnerability identification using industry leading scanning tools and manual code reviews -
Experience with the Top 10 OWASP (Open Web Application Security Project) vulnerabilities (most critical web vulnerabilities) and how to identify and remediate them - Solid understanding of Information Security in general and the specific behaviors that would secure TSYS information assets -
Ability to translate Information Security policies and procedures into language that a business and/or technical person can understand; and ability to effectively communicate with both non-technical and technical people -
Strong problem solving with the ability to methodically and objectively analyze and resolve Information Security challenges - Ability to work well inside and outside the team.

******Please be inform that at this time all the positions do not have any relocation package, or the flexibility to work remotely, and do not offer any work permit, all the candidates must have their own authorization paper work.

Interested! Send your updated CV and answer the questions below:


1) Have you ever worked or applied to this company before?

2) How far are you from the location? Where are you located?

3) What are your salary expectations for this position?

4) Are you a US citizen or a green card holder? (the company will not provide any work visa, they must have their own)

5)How many years of experience do you have in this industry?

6) Why are you looking for a new opportunity



نوع التوظيف

دوام كامل

نبذة عن الشركة

40 موظف
الإبلاغ عن هذه الوظيفة
إخلاء المسؤولية: د.جوب هو مجرد منصة تربط بين الباحثين عن عمل وأصحاب العمل. ننصح المتقدمين بإجراء بحث مستقل خاص بهم في أوراق اعتماد صاحب العمل المحتمل. نحن نحرص على ألا يتم طلب أي مدفوعات مالية من قبل عملائنا، وبالتالي فإننا ننصح بعدم مشاركة أي معلومات شخصية أو متعلقة بالحسابات المصرفية مع أي طرف ثالث. إذا كنت تشك في وقوع أي احتيال أو سوء تصرف، فيرجى التواصل معنا من خلال تعبئة النموذج الموجود على الصفحة اتصل بنا