Senior Application Security Engineer (M/F/D) | (Ip874)

Detalles de la oferta

Purpose & Overall Relevance for the Organization: The selection, design, justification, implementation, and operation of controls and management strategies to maintain the security, confidentiality, integrity, availability, accountability, and relevant compliance of information systems with legislation, regulation, and relevant standards.
Key Responsibilities: Information Security: Provides advice and guidance on security strategies to manage identified risks and ensure adoption and adherence to standards. Obtains and acts on vulnerability information and conducts security risk assessments, business impact analysis, and accreditation on complex information systems. Investigates major breaches of security and recommends appropriate control improvements. Contributes to the development of information security policy, standards, and guidelines.Specialist Advice: Actively maintains recognized expert level knowledge in one or more identifiable specialisms. Provides definitive and expert advice in their specialist area(s). Oversees the provision of specialist advice by others, consolidates expertise from multiple sources, including third-party experts, to provide coherent advice to further organizational objectives. Supports and promotes the development and sharing of specialist knowledge within the organization.Research: Within given research goals, builds on and refines appropriate outline ideas for research, including evaluation, development, demonstration, and implementation. Applies standard methods to collect and analyze quantitative and qualitative data. Creates research reports to communicate research methodology, findings, and conclusions. Contributes sections of material of publication quality. Uses available resources to update knowledge of any relevant field and curates a personal collection of relevant material. Participates in research communities.Emerging Technology Monitoring: Supports monitoring of the external environment and assessment of emerging technologies to evaluate the potential impacts, threats, and opportunities to the organization. Contributes to the creation of reports, technology road mapping, and the sharing of knowledge and insights.Security Administration: Maintains security administration processes and checks that all requests for support are dealt with according to agreed procedures. Provides guidance in defining access rights and privileges. Investigates security breaches in accordance with established procedures and recommends required actions and supports/follows up to ensure these are implemented.Digital Forensic: Contributes to digital forensic investigations. Processes and analyzes evidence in line with policy, standards, and guidelines and supports the production of forensics findings and reports.Penetration Testing: Maintains current knowledge of malware attacks and other cybersecurity threats. Creates test cases using in-depth technical analysis of risks and typical vulnerabilities. Produces test scripts, materials, and test packs to test new and existing software or services. Specifies requirements for environment, data, resources, and tools. Interprets, executes, and documents complex test scripts using agreed methods and standards. Records and analyzes actions and results. Reviews test results and modifies tests if necessary. Provides reports on progress, anomalies, risks, and issues associated with the overall project. Reports on system quality and collects metrics on test cases. Provides specialist advice to support others.Relationship Management: Implements stakeholder engagement/communications plan. Deals with problems and issues, managing resolutions, corrective actions, lessons learned, and the collection and dissemination of relevant information. Collects and uses feedback from customers and stakeholders to help measure the effectiveness of stakeholder management. Helps develop and enhance customer and stakeholder relationships.Identify, Reproduce, and Report Security Issues: Conduct internal security reviews. Collaborate with software engineers to improve software. Collaborate with Product Owners and Architects to identify and understand vulnerabilities related to products. Keep abreast of new vulnerabilities and attack vectors and associated countermeasures. Participate in security issue management processes. Analyze penetration test reports. Provide technical support for Red Team exercises. Manage bug bounty triage.Key Relationships: Global IT, Respective business function (GOPS, Finance, HR, Brand Marketing, Wholesale/Retail), HR Management, Controlling.
Knowledge, Skills, and Experience: A 'breaker' mentality, but effective at crafting the mitigating controls. Provide hands-on remediation guidance to product teams. Penetration testing and red teaming experience in corporate environments (Burp, Cobalt Strike, MITRE ATT&CK framework). Knowledge of DevSecOps or secure SDLC.

#J-18808-Ljbffr


Salario Nominal: A convenir

Fuente: Jobleads

Requisitos

Qa Automatización | Híbrido Zaragoza

En KENOS Technology buscamos incorporar un/a QA Automatización, con mínimo de 2 años de experiencia para unirse a un proyecto estable y híbrido en Zaragoza, ...


Kenostechnology - Zaragoza

Publicado 16 days ago

Technical Account Manager, Enterprise Support, Strategic Industries, Energy

Technical Account Manager, Enterprise Support, Strategic Industries, EnergyJob ID: 2827790 | AWS EMEA SARL (Portugal Branch)At AWS Enterprise Support we're l...


Amazon - Zaragoza

Publicado 16 days ago

Data Center Physical Security Specialist, Dub South

Data Center Security Specialist, DUB SouthJob ID: 2737391 | Amazon Data Services Ireland LimitedAmazon Web Services (AWS) provides storage, compute and other...


Amazon - Zaragoza

Publicado 16 days ago

Onsite Search Expert

Onsite Search ExpertAn onsite search expert focuses on making a website search engine friendly by adjusting certain elements of the website. This is also kno...


Axiom Software Solutions - Zaragoza

Publicado 16 days ago

Built at: 2024-12-30T09:15:06.264Z