The unit\xe2\x80\x99s primary purpose is to Design, Engineer & eventually Embed practical & balanced cyber / information security principles/patterns/controls into all products and platforms. Conduct security assessments, gap analysis, provide remediation to the relevant squads / stakeholders.
Job Purpose:
Primary/General Job Purpose:
Encourage \xe2\x80\x98Shift Left\xe2\x80\x99 Mindset - Proactively embed security requirements, by influencing implementation of security & privacy patterns from the start of the development cycle.
Implement via Influence - Influence stakeholders such as Product Owners, Solution Architects, Developers, Testers, Engineers & others to include security patterns into features, epics and stories in order to build secure, innovative & superior digital products for customers and employees.
Assessments \xe2\x80\x93 Perform security assessment and perform gap analysis to provide appropriate remediations to the teams for implementing the fixes.
Key Skills \xe2\x80\x93 Application Security, Security Code review, API security, Platform security, IAST, SAST, DAST, Infrastructure security and Cloud Security \xe2\x80\x93 MS Azure
Tools and Technologies \xe2\x80\x93 Expertise in Azure Security Center and Azure Policies, Burp Suite, Nessus, Checkmarx, Kubernetes, Docker, Jenkins, GitHub, OpenShift and good knowledge about microservice architecture and pipeline driven
Qualifications
Application Security Assessment Skillset :
Web Application Security
Security Code Review
Azure and AWS Cloud Security config review
Azure Virtual Desktop - AVD Security Review
Container Review
WAF rules review
Azure Security :
Azure Security Center
Azure AD RBAC
Privileged Identity Management
Conditional Access Policies
Azure Advanced Threat Protection
Azure Information Protection and HYOK
Enterprise mobility with Intune MAM and MDM Policies
Office365 ATP and Mail-flow
Microsoft cloud threat intelligence
Microsoft Cloud Application Security \xe2\x80\x93 CASB setup and monitoring
Windows Defender ATP
Policy configuration for Onedrive, Sharepoint, Outlook, Teams and Office Pro Plus
Azure AD Hybrid Join and Password Hash Sync
Customer Lockbox and advanced compliance policies in Azure cloud
AIP Data classification and reviewing DLP policies
Soft Skills:
Ability to collaborate with multiple stakeholders and manage their expectations from a security perspective.
Holistic thinking; must balance security and functionality using practical demonstrable Must also contribute to and implement \xe2\x80\x9cgood architecture principles\xe2\x80\x9d to lower technical debt.
Assertive personality; should be able to hold her/his own in a project board or work group setting.
Superlative written and verbal communication skills; should be able to explain technical observations in an easy-to-understand manner.
Ability to work under pressure and meet tough/challenging deadlines.
Influencer- must be able to convince various stakeholders (internal IT Teams, C-Level execs, Risk & Audit) of why a certain observation is a concern or not.
Strong understanding of Risk Management Framework and security controls implementation from an implementer standpoint
Has strong decision making, planning and time management
Can work independently.
Has a positive and constructive attitude.
Education
Bachelor\xe2\x80\x99s degree in a computer-related field such as computer science, cyber/information security discipline, physics, mathematics or similar
General Information Security: CISSP, OSCP, CEH, CISM/CISA or similar
General Cloud Security: CCSK /CCSP or similar
Specific Cloud Security: AWS/Azure/GCP/Oracle Solution/Security or similar
Must have minimum 4 years of experience in an information security function with good background in information technology, stakeholder management and people management
Minimum 3 years of experience, as a Security Engineer especially in Cloud Native environments.
Deep foundational knowledge, understanding and application on all aspects of Information Security concepts from broad range of technical and non- technical areas (Technical).
Expert at the technology and frameworks in his/her area of expertise, and coach other architect on development standards and best practices.
Good understanding of enterprise level target architecture and public and private cloud platforms (IaaS/PaaS).
Good hands-on experience solutioning technology architectures that involve perimeter protection, core protection and end-point protection/detection & API /Micro services Security.
Experience working in a DevOps environment with knowledge of Continuous Integration, Containers, DAST/SAST tools and building Evil Stories (Technical).
Good knowledge of the concerns and threats that revolve around Cloud Security and how those concerns can be mitigated (Technical).
The Analyst / Engineer has the skill to follow design principles and applies design patterns to enforce maintainable and reusable patterns, in the form of code or otherwise.
The Analyst / Engineer can understand and interpret potential issues found in source or compiled code.
The Analyst / Engineer has automation skills/capability in the form of scripting or similar.
The Analyst / Engineer can attack application and infrastructure assets, interpret threats, and suggest mitigating measures.
Ability to interpret Security Requirements mandated by oversight functions and ensure comprehensive coverage of those requirements, via documentation, within high level design and/or during agile ceremonies, via Evil Stories.
The Analyst / Engineer can propose options for solutions to the security requirements / patterns that provide a balance of security, user experience & performance.
The Analyst / Engineer has the skill to discuss and present solutions to other architecture, security, development, and leadership teams.
The Analyst / Engineer can interpret and understand vulnerability assessment reports and calculate inherent and/or residual risks based on the assessment of such reports.
Ability to articulate and be a persuasive leader who can serve as an effective member of the senior management team.
Good negotiation skills will be desirable.
Must have good judgment skills to decide on an exception approval.
Ability to enforce improvements when necessary, using Influence rather than Policing measures.
Superior written and verbal communication skills to effectively communicate security threats and recommendations to technical or non-technical stakeholders.
Knowledge of application of Agile methodologies/principles such as Scrum or Kanban.