Position: Application Security Analyst
Location: New York NY 10001 (Hybrid 3 days onsite)
Duration: 36 months with the possibility of extension to 24 months more
Objective:
- Audit and analyze and accredit HRA/DSS/DHS Applications being moved as part of the Data Center Migration Project.
Scope/Tasks Breakdown:
- Evaluate Application vulnerability scan reports
- Document application vulnerabilities found in scan reports and define vulnerabilities mitigation SLAs
- Assess if the application vulnerabilities found in scan reports are within the Agency Risk Appetite
- Communicate and report application vulnerability findings to Business Owner(s) and IT Heads
- Develop application vulnerability mitigation strategy and mitigation controls to make the applications secure within the agency infrastructure environment
- Evaluate mitigated application vulnerabilities with development teams to perform security accreditation for production deployment
- Enforce Risk Acceptance Letter for applications seeking production deployment with unmitigated application vulnerabilities requiring approval from Business Owner(s) IT Head and CISO.
Position: Application Security Analyst Location: New York NY 10001 (Hybrid 3 days onsite) Duration: 36 months with the possibility of extension to 24 months more Objective: Audit and analyze and accredit HRA/DSS/DHS Applications being moved as part of the Data Center Migration Project. S...
Position: Application Security Analyst
Location: New York NY 10001 (Hybrid 3 days onsite)
Duration: 36 months with the possibility of extension to 24 months more
Objective:
- Audit and analyze and accredit HRA/DSS/DHS Applications being moved as part of the Data Center Migration Project.
Scope/Tasks Breakdown:
- Evaluate Application vulnerability scan reports
- Document application vulnerabilities found in scan reports and define vulnerabilities mitigation SLAs
- Assess if the application vulnerabilities found in scan reports are within the Agency Risk Appetite
- Communicate and report application vulnerability findings to Business Owner(s) and IT Heads
- Develop application vulnerability mitigation strategy and mitigation controls to make the applications secure within the agency infrastructure environment
- Evaluate mitigated application vulnerabilities with development teams to perform security accreditation for production deployment
- Enforce Risk Acceptance Letter for applications seeking production deployment with unmitigated application vulnerabilities requiring approval from Business Owner(s) IT Head and CISO.
View more
View less