We are looking for a highly-skilled Security professional with a good aptitude for Threat Modeling ability to read through (software) architectural documents and requirements from the different business groups and give accurate and actionable recommendations for the engineers to implement.
The Consultant must have a good understanding of software architecture and development for threat modeling purposes identify designs and implementations which go against best practices and security vulnerabilities analyze the system and break it down into key components based off logic and speak to security risks which may be found in each of those components and apply sound logic and risk determination in relation to risk acceptance and business operation impact.
Job Title: Security Consultant
Location: Hybrid San Francisco CA; Seattle WA; New York NY
Contract: Long-Term
Only candidates close to or willing to (immediately) relocate themselves to the specified locations will be considered.
Requirements:
Security Design Review
- In-depth knowledge of secure software development practices and SDLC
- Experience with threat modeling techniques and tools
- Strong understanding of common security frameworks (e.g. OWASP NIST)
- Proficiency in identifying and mitigating security vulnerabilities in application designs
- Familiarity with regulatory compliance standards (e.g. GDPR HIPAA PCI-DSS)
- Ability to analyze complex data flows and identify sensitive data protection needs
- Experience with security architecture microservice architecture and design patterns
- Strong communication skills to effectively convey security concepts to technical and non-technical stakeholders
- Hands-on experience with security tools (e.g. static analysis DAST SAST)
- Proven ability to collaborate with cross-functional teams including Developers and DevOps
- Experience with integrating security into CI/CD pipelines
- Knowledge of encryption authentication and access control mechanisms
- Familiarity with Cloud security architecture (AWS Azure GCP OCI)
- Experience in conducting risk assessments and developing mitigation strategies
- Familiarity with automated security testing and continuous monitoring practices
- Ability to document and report security findings clearly and effectively
- Experience with incident response planning and forensic readiness in application design
- Strong problem-solving skills and attention to detail
Threat Modeling
- Deep understanding of threat modeling methodologies particularly STRIDE and the associated design patterns to correct and/or mitigate security attacks and threat
- Proficiency in identifying and categorizing threats vulnerabilities and risks
- Experience with threat modeling tools (e.g. Microsoft Threat Modeling Tool OWASP Threat Dragon)
- Strong knowledge of security frameworks and standards (e.g. OWASP NIST)
- Ability to map threat models to security requirements and controls
- Experience in applying STRIDE to various architectural patterns and data flows
- Familiarity with risk assessment and management practices
- Ability to work with cross-functional teams to integrate threat modeling into the SDLC
- Strong analytical skills for identifying potential attack vectors and weaknesses
- Experience with security architecture and defensive design techniques
- Effective communication skills to explain threat modeling findings to stakeholders
- Knowledge of common security vulnerabilities and their mitigation (e.g. SQL injection XSS)
- Ability to create and maintain comprehensive threat models for complex systems
- Experience in developing mitigation strategies based on threat model findings
- Familiarity with regulatory compliance requirements and their impact on threat modeling
- Strong documentation skills to create detailed threat model reports
- Continuous learning mindset to stay updated on emerging threats and modeling techniques
Highly Desired
- Experience with one of: Go Java Python NodeJS
- Experience with RDBMS and non-RDBMS (NoSQL) data store technologies such as PostgreSQL MySQL Hadoop GCP BigQuery AWS RDS & DynamoDB GraphQL etc.
- Experience with Identity-aware proxy and HTTP routing technologies
Highly Desired
- Familiarity with privacy and security compliance standards such as GDPR HIPAA PCI-DSS and how they guide or affect secure systems design
Threat Modeling STRIDE Offensive Security Perspectives & Techniques OWASP Top 10 Penetration Testing External XML Entity (XXE) Injection System Design & Architecture