This position consults with IT, Project Management, Product Management, Software Development and other peers on proper security architecture and software development processes to ensure the applications developed and systems implemented are in line with security best practices and Early Warning Services policies and standards.
- Complete the Identification, measurement, control and minimization of security risks to information systems across a broad range of disciplines including application and host security.
- Evaluates the current methods in use by Early Warning to access and process data via Early Warning customer facing applications.
- Develops repeatable application security architectures working with internal and external partners to ensure that systems are placed within the relevant security zones based on the data they house and their purpose.
- Serves as the point of contact for all security issues in assigned areas.
- Works with architecture teams to ensure that all newly developed and legacy applications and infrastructure implementations are in line with security policy and are compliance to the required frameworks (ISO, PCI, OWASP, NIST 800-53, etc.)
- Advises and approves of changes and architectures for assigned areas from a security perspective.
- Evaluates all product business cases including functional and detailed design specs to ensure security standards are met.
- Assists in the security incident response process as assigned.
- Contributes to the development of Early Warning security policy and procedures.
- Develops architectural reference material to ensure that security practices are being implemented in a repeatable fashion every time a new project is implemented.
- Document and present risks and security issues that could impact the confidentiality, integrity and/or availability of the business (both internally and externally) by assisting in documentation, tracking and creating solutions for mitigation.
- Work with internal and external penetration testing organizations to coordinate application and network based penetration
- Manages efforts with Software Development to perform static code analysis on all custom developed code.
- Interacts with customer banks to gather yearly testing and security requirements, review penetration testing findings, mitigating controls and/or projects to rectify security vulnerabilities.
- Support the company's commitment to protect the integrity and confidentiality of systems and data.
- Education and experience typically obtained through completion of a Bachelor’s degree in Computer Science, Engineering, Math or Physical Science
- A minimum 2 years of application security experience and 2 years of Security Architecture or Consulting experience.
- Advanced knowledge of relational databases, Windows, and Linux operating systems.
- Effective interpersonal skills, with ability to present to peers and coworkers.
- Advanced knowledge of operating system, application, network, and database security architectures.
- Proficiency in AppSec and Web services security.
- Application development background.
- Delivered talks/presentations or published whitepapers
- CEH/CPT Certification and one of CISSP, CSSLP or equivalent certification.
- Exposure to the Agile SDLC process.
- Advanced experience in analyzing technical issues and making recommendations for corrective action.
- Demonstrate advanced understanding in the field of Information Security in terms of both concepts and technology.
- Ability to manage information security related efforts.
- Advanced understanding of vulnerability exploitation chaining.
- MCSE, SCSA, CCNA or CISA certification
- Unix administration or hobbyist
- Additional related education and/or experience preferred
- Familiarity with HP Fortify
- Familiarity with application penetration testing tools
- Proxies (Burp Suite Pro, Zed Attack Proxy)
- Scanners (Netsparker, AppScan, WebInspect)
- XML Tools (SOAP UI)
- Familiarity with BSIMM framework
The above job description is not intended to be an all-inclusive list of duties and standards of the position. Incumbents will follow instructions and perform other related duties as assigned by their supervisor.