API Security Automation Lead at Reston, Virginia, USA |
Email: [email protected] |
From: Sandeep Bisht, Key Infotek [email protected] Reply to: [email protected] Role- API Security Automation Lead Location- Reston, VA (Remote Till COVID) Core Skills:- API Security Automation (API Security testing tools Data Theorem or Synopsys & Ready API or Traceable, JMeter, Postman) Job Description: 10+ years' experience reviewing project architectures and solutions. 6+ years' experience leading application security architecture efforts that require close collaboration with project teams and business stakeholders. Foundational and functional understanding of how API works (RESTful, SOAP) Understanding of API security - specifically on common controls for API security (SSO, OAuth, Threat Protection) Security elements of API gateway integrations of API - WAF, Websockets Familiarity of Identify and Access Management - AWS IAM integrations Proficiency in AppSec and Web services security. Strong experience in working with any of below API Security testing tools / frameworks: Data Theorem, Synopsys, Ready API, Traceable, JMeter, Postman Experience in building security test automation framework for API's Design, develop automated test scripts to validate integrity of application components, API's and frameworks Identify vulnerabilities across of your API's Hands on experience with automation of API's using SOAP UI and RESTful API's Experience with Test automation of API's Scripting automation using Java or Python based frameworks Ability to facilitate communications to business stakeholders and interact effectively with all levels of management. Ability to work in a highly collaborative environment and be comfortable with ambiguity. Exceptional experience influencing collaborating and negotiating positive outcomes across stakeholders in highly matrixed organization. Experience with Enterprise Architecture frameworks such as TOGAF, DoDAF, FEAF etc. Ability to lead Security Architecture consultation with other parts of Information Security, Enterprise/Business/Data Architecture, IT and Business partners, and peers on proper security architecture and software development processes to ensure the applications developed and systems implemented are in line with security best practices and company policies and standards and are compliant with the required frameworks (ISO, SOX, SWIFT, OWASP, NIST Cyber Security, etc.). Ability to develop repeatable application security architectures working with internal and external partners. Contribute to the development of architectural reference material to ensure that security practices are being implemented in a repeatable fashion. Partner with EA Portfolio and Initiative Architects to assess security threats, identifying and tailoring security requirements, and integrating security controls into the Software Development Lifecycle (SDLC). Ability to document and diagram technical systems and architectures. Experience in an environment using agile methodology. Demonstrated experience integrating security within the various cloud service models (e.g., IaaS, PaaS, SaaS). Able to identify the appropriate security solutions for various cloud implementations. Able to architect, implement, and document system security controls. Ability to review system documentation for proposed projects (e.g., system requirements, detailed design/architecture, interface documents, etc.), identify security gaps and provide security recommendations to address those gaps, and complete risk profiles for cloud computing solutions. Ability to advise and approve of changes and architectures for assigned areas from an application security perspective. Ability to perform as a subject matter expert and contribute to the development of company security policy and procedures. Ability to lead efforts that document and present risks and security issues that could impact the confidentiality, integrity and/or availability of the business (both internally and externally). Ability to assess risk to applications associated with emerging threats and threat vectors. Previous industry experience with application security including static code review, automatic code scans, and security architecture review, penetration testing, and mitigating application-level vulnerabilities. Strong knowledge of networking, Unix/Linux, virtualization, authentication, cryptography. Must be fully conversant up and down the technology stack. Proven expertise in building a defense in depth infrastructure security architecture that includes security controls across the technology stack. Must have solid knowledge and understanding of securing all major operating systems. Demonstrated working knowledge of major cloud platforms; AWS, Azure, SalesForce, ServiceNow, etc. Expert knowledge of the operating system, application, network, and database security architectures. Development background particularly building enterprise applications (Java Preferably) Excellent verbal and written communication skills. Applicable security certifications desired; CISSP, CEH, GIAC, GSEC, or CSSLP or advanced degree in InfoSec. Keywords: user interface information technology |
[email protected] View all |
Mon Jan 09 19:01:00 UTC 2023 |