Cyber Security - Information Security - Day 1 Onsite (5days working) at Atlanta, Georgia, USA |
Email: [email protected] |
---------- Forwarded message --------- From: <[email protected]> Date: Mon, Jun 10, 2024, 10:20 PM Subject: Cyber Security - Information Security - Day 1 Onsite (5days working) To: Faisal Siddiqui <[email protected]> Hi All, Role name: Agile Architect Role Description: 1. Perform Threat Analysis & Create/Update the Threat Modelling The Information Security Architect performs threat analyses for complex technical designs and reports the results using standard templates. The Information Security Architect creates the initial Threat Modelling (with new applications/systems) or updates an existing Threat Modelling (with upgraded applications/systems). The Information Security Architect tracks critical and high findings and updates the respective changes in the Threat Modelling.2. Derive Security Requirements Given application or system descriptions, the Information Security Architect derives security requirements that will match the respective level of abstraction. 3. Review Design and Report Issues The Information Security Architect reviews the design documents with respect to o Fulfillment of security requirements o (Common) design errorso Already known design shortcomings (are they fixed or not) The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.4. Review Implementation and Report Issues The Information Security Architect reviews the implementation with respect to Fulfillment of security/design requirements (Common) implementation errors, Already known implementation shortcomings (e.g., from Code scan or Pen Testing, are they fixed or not) The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.5. Review Project Security Planning and Report Issue The Information Security Architect reviews various project management documents with respect to o plausibility of effort estimates for planned security tasks,o plausibility of cost estimates for planned security tasks,o overall plausibility of the timeline for security tasks,o the overall progress of security, o completeness of planned security tasks o security budget planning,o ordering status of mandatory security services,o mandatory security-related tasks The Information Security Architect submits a written report that lists. o all shortcomings, together with suggestions on how to fix them,o all possible risks to achieving project goals that relate to information security.6. Cyber Security Incident Management Responsible for end-to-end cyber security incident management process.7. Various Expert Consulting The Information Security Architect will answer explicit questions on various security-related subjects, e.g. on o Information Classification, o Security aspects of project management, o Technical information security, etc.o Cryptography,o Cloud Security,o TPRM Third-Party Risk Managemento Vulnerability Review and Assessment,o Dev Sec-opso Security Toolso Audit Support (External and Internal)8. Technical Security Tasks Given the necessary input, the Information Security Architect will perform complex tasks with a specific, well-described result. T Competencies: Cyber Security - Information Security Experience (Years): 10 & Above Essential Skills: 1. Perform Threat Analysis & Create/Update the Threat Modelling The Information Security Architect performs threat analyses for complex technical designs and reports the results using standard templates. The Information Security Architect creates the initial Threat Modelling (with new applications/systems) or updates an existing Threat Modelling (with upgraded applications/systems). The Information Security Architect tracks critical and high findings and updates the respective changes in the Threat Modelling.2. Derive Security Requirements Given application or system descriptions, the Information Security Architect derives security requirements that will match the respective level of abstraction. 3. Review Design and Report Issues The Information Security Architect reviews the design documents with respect to o Fulfillment of security requirements o (Common) design errorso Already known design shortcomings (are they fixed or not) The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.4. Review Implementation and Report Issues The Information Security Architect reviews the implementation with respect to Fulfillment of security/design requirements (Common) implementation errors, Already known implementation shortcomings (e.g., from Code scan or Pen Testing, are they fixed or not) The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.5. Review Project Security Planning and Report Issue The Information Security Architect reviews various project management documents with respect to o plausibility of effort estimates for planned security tasks,o plausibility of cost estimates for planned security tasks,o overall plausibility of the timeline for security tasks,o the overall progress of security, o completeness of planned security tasks o security budget planning,o ordering status of mandatory security services,o mandatory security-related tasks The Information Security Architect submits a written report that lists. o all shortcomings, together with suggestions on how to fix them,o all possible risks to achieving project goals that relate to information security.6. Cyber Security Incident Management Responsible for end-to-end cyber security incident management process.7. Various Expert Consulting The Information Security Architect will answer explicit questions on various security-related subjects, e.g. on o Information Classification, o Security aspects of project management, o Technical information security, etc.o Cryptography,o Cloud Security,o TPRM Third-Party Risk Managemento Vulnerability Review and Assessment,o Dev Sec-opso Security Toolso Audit Support (External and Internal)8. Technical Security Tasks Given the necessary input, the Information Security Architect will perform complex tasks with a specific, well-described result. T Desirable Skills: 1. Perform Threat Analysis & Create/Update the Threat Modelling The Information Security Architect performs threat analyses for complex technical designs and reports the results using standard templates. The Information Security Architect creates the initial Threat Modelling (with new applications/systems) or updates an existing Threat Modelling (with upgraded applications/systems). The Information Security Architect tracks critical and high findings and updates the respective changes in the Threat Modelling.2. Derive Security Requirements Given application or system descriptions, the Information Security Architect derives security requirements that will match the respective level of abstraction. 3. Review Design and Report Issues The Information Security Architect reviews the design documents with respect to o Fulfillment of security requirements o (Common) design errorso Already known design shortcomings (are they fixed or not) The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.4. Review Implementation and Report Issues The Information Security Architect reviews the implementation with respect to Fulfillment of security/design requirements (Common) implementation errors, Already known implementation shortcomings (e.g., from Code scan or Pen Testing, are they fixed or not) The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.5. Review Project Security Planning and Report Issue The Information Security Architect reviews various project management documents with respect to o plausibility of effort estimates for planned security tasks,o plausibility of cost estimates for planned security tasks,o overall plausibility of the timeline for security tasks,o the overall progress of security, o completeness of planned security tasks o security budget planning,o ordering status of mandatory security services,o mandatory security-related tasks The Information Security Architect submits a written report that lists. o all shortcomings, together with suggestions on how to fix them,o all possible risks to achieving project goals that relate to information security.6. Cyber Security Incident Management Responsible for end-to-end cyber security incident management process.7. Various Expert Consulting The Information Security Architect will answer explicit questions on various security-related subjects, e.g. on o Information Classification, o Security aspects of project management, o Technical information security, etc.o Cryptography,o Cloud Security,o TPRM Third-Party Risk Managemento Vulnerability Review and Assessment,o Dev Sec-opso Security Toolso Audit Support (External and Internal)8. Technical Security Tasks Given the necessary input, the Information Security Architect will perform complex tasks with a specific, well-described result. T Country: United States Branch | City | Location: Atlanta,GA Thanks & Regards Mohd Faisal [email protected] www.signinsol.com To follow and receive more updates please Click Here -- Keywords: information technology Georgia Maryland Cyber Security - Information Security - Day 1 Onsite (5days working) [email protected] |
[email protected] View all |
Mon Jun 10 22:22:00 UTC 2024 |