Sr. Application Security Risk Analyst

apartmentQlotech placeDelhi calendar_month 

ob Title: Sr. Application Security Risk AnalystDepartment: Information Security and ComplianceJob Types: Full-time, PermanentLocation: India

Key Responsibilities: Work with various senior IT leaders and application development areas to develop and implement S-SDLC Program according to the organizations unique information security risk management, governance, risk, and compliance processes;

Provides oversight / governance of the S-SDLC Program and communicates progress and issues to the CISO, Senior Business / IT Leadership and Application Development teams;
Serves as a consultant to disseminate specialist application security knowledge to the development communities;
Researches and evaluates solutions and recommends the most efficient and cost effective solutions for ensuring that security is built-in to all phases of the S-SDLC;

Research and assess latest BlockChain security vulnerabilities and events

Leads demonstrations of application security tools to business and application development teams;

Responsible to integrate & manage feeds from application security tools, vulnerability scans & penetration testing tools into organizations GRC platform;

Responsible for the implementation and maintenance of Static, Dynamic, Interactive, and API application security testing tools (such as Veracode, Checkmarx, Synopsys, and Netsparker), scanning policies, user provisioning and security strategy documents, and any other related documentation;

Initiates and develops innovative concepts to solve complex challenges in the Code Analysis Tools environment with little or no precedent; creates new opportunities to enable the use of new solutions. Provides conceptual guidance to other senior and high-level technical experts;

Engages Veracode, Checkmarx, Synopsys, and Netsparker and/or other third-party suppliers of application security software on system defects, support issues;
Lead and manage organizations bug bounty program;
Stay knowledgeable of current advances in all areas of information technology concerning vulnerabilities, security breaches or malicious attacks; Identify vulnerabilities or weaknesses in systems;
Develop an externally-focused view of the evolving threats facing organization;
Report to management on IT system vulnerability and protection against malware and hackers;
Examine systems and procedures to identify potential adverse events, including but not limited to hardware and software crashes, physical disasters, malicious intruders, malware, denial of service attacks and employee misconduct;
Evaluate security policy, processes and procedures for completeness;
Assist in identifying breaches in organizations security or tracking the source of an unauthorized intrusion;
Monitor and advise on information security issues related to the systems to ensure the security controls are appropriate and operating as intended; Ensure that controls are adequate to protect sensitive information systems;
Develop and maintain security operating procedures and associated documentation;
Identify inefficiencies and make suggestions for process improvements;
Develop and implement process for regular user recertification;
Validate the removal process for application access for terminated employees;
Perform semi-annual user access and entitlement reviews across the organization;
Perform quarterly reviews and recertifications of privileged accounts;
Identify and document the various functions and processes within each application;
Develop and maintain SOD matrices for each application used within the organization along with identification of toxic combinations;
Identify any conflicting duties based on the SOD Matrix and toxic combinations and perform remediation;
Develop roles and access profiles based on the SOD in collaboration with the business users;
Identify and document list of users and mapping to various functions and processes;

Assist with internal/external audits and regulatory examinations (such as SOC, IAA (IT General Control Audits), DFS etc.) as they relate to Identity Access Management and Application Security controls and remediation of issues discovered during the control testings;

Track open audit issues to closure and reporting on status completion and progress;

Review access controls processes to identify vulnerabilities and the appropriate solutions to eliminate or minimize their potential effects;

Skills and Experience: Minimum 7-8 years of experience in application architecture and design reviews

Minimum 7-8 years of experience in application security assessment/testing experience (white box, black box, code review and forensic testing)

Knowledge of application security processes and standards including OWASP (ASVS etc.), CVSS rating, factors impacting risk rating etc.

Experience in threat modelling and application risk analysis

Experience in application privacy impact analysis

Experience in performing application decomposition and analysing security issues

Strong knowledge of designing, deploying, and maintaining security architecture in critical business applications

Experience in performing evaluation and assessment of SDLC processes and security controls

Experience in evaluating app sec processes to identify improvements and envision/develop automation within CI/CD pipelines

Experience in developing Security testing scripts and procedures

Hands on experience with Static, Dynamic, Interactive, and API application security testing tools such as Veracode, IBM AppScan, Fortify, Web Inspect, Checkmarx, Synopsys, and Netsparker

Experience in testing and assessing security of mobile applications

Experience with web services (API) architecture, security reviews and testing.

Experience in integrating application security tools and processes in CI/CD pipelines

Coding experience with at least .NET, J2E, Python, C++ etc.

Knowledge of cryptographic tools and security APIs

Knowledge of micro service architecture

Knowledge of BlockChain, Smart Contracts, DApps etc.

Solid understanding of networking concepts

Solid understanding of operating system security concepts

Solid understanding of Encryption, Certificate & Key Management Services (CM, KMS, HSM etc.)

Understanding of malware, emerging threats, attacks, and vulnerability management

Experience assisting the development and maintenance of tools, procedure, and documentation

Personal Requirements :Required Certifications Required: CPT, CEH

Certifications Optional: CISSP, AWS Certified Solutions Architect, AWS Certified Security Specialist, Google Cloud Architect, Google Cloud Security Engineer, CCSP (Certified Cloud Security Professional)

placeModesto, 20 mi from Delhi (CA)
assessments and ergonomic risk analyses  •  Develop and implement site-specific wellness initiatives and programs  •  Use innovative, creative solutions and employee empowerment to design and implement ergonomic interventions  •  Provide first-aid treatment...
placeTracy (CA), 41 mi from Delhi (CA)
risk assessments and corrective action planning, OSHA emergency/first aid treatment, health education, and worksite health promotion and marketing activities. Position Responsibilities:  •  Perform comprehensive wellness assessments and ergonomic risk...
placeModesto, 20 mi from Delhi (CA)
and corrective action planning, OSHA emergency/first aid treatment, health education, and worksite health promotion and marketing activities. Position Responsibilities:  •  Perform comprehensive wellness assessments and ergonomic risk analyses  •  Develop...