The Cyber Security Software Engineer will support internal and sponsor funded cyber security research projects in developing solutions for a variety of cyber, network, and host security problems. These are complex problems that must be solved through effective design, decomposition, and implementation.
In this role, the selected candidate will act as a trusted technical security advisor to all levels of the organization for a variety of information security projects that arise from current business and technological developments.
In this role, you will work with development teams to design security into the system and drive security reviews; develop tools to assist in modeling, analysis, detection, and prevention of security threats.
In this role, you will express host to host connection into policy, a high performing policy engine, log connection and data transformation, alerting and compensation action framework and data encryption for both data in motion and data at rest.
In this role, the selected candidate will be responsible for perform end-to-end application security reviews to ensure critical information is appropriately protected; identify security vulnerabilities and risks, and develop mitigation plans.
The Information security officer is primarily responsible for ensuring data security within their organization. They are in charge of implementing effective technology solutions that prevent internal and external malicious users from compromising data integrity.
In this role, the selected candidate will perform vulnerability assessments utilizing IT security tools and methodologies; perform assessments of the IT security/risk posture within the IT network, systems and software applications, in addition to assessments of vendors.