What you will do
1. Liaising with the Hardware/Firmware and Software engineering teams to schedule code reviews/scans as per guidelines outlined by JCI cyber Security Board.
2. Working with Senior Cyber architect to run and discuss results of scans, assess where the risks lie, how best to mitigate
3. Working with the development team to address cyber risks
4. Being the gatekeeper and working with the development team and our customers ensuring that all products and solutions released to the market adhere to the latest security standards.
How you will do it
You will work across multiple parallel project releases and work items and will have a strong desire to actively champion product cybersecurity best practices. The ideal candidate will take ownership of issues and work on own initiative, driving work items to successful completion. You will have good time-management and organizational skills and be a continual learner, aware of the ever-changing nature of cybersecurity and keen to stay on top of the latest developments.
What we look for
5. Basic familiarity with, and keen interest in, formal cybersecurity controls and best practices. E.g., OWASP Top 10, NIST 800-53.
6. Ability to liaise and negotiate amongst multiple product stakeholders, including:
Engineering management, architects, and lead engineers
Product Security Incident Response Team (PSIRT)
Global Cybersecurity architects
Product Management
Supplier Assessment Team
Site Reliability Engineering (SRE)
Legal (Software Copyright / Licensing Compliance, Trade Compliance)
Individual software and hardware engineers
7. Previous development experience, including familiarity with authentication, authorization, and SDKs and local and remote APIs.
8. Basic networking experience and understanding
9. Understanding of, including ability to reason about and explain common cybersecurity vulnerabilities. E.g., can (to some extent) compare and contrast SOME of:
Authentication vs. authorization
Vulnerability vs. weakness
Hashes vs. ciphers
SQL injection vs. OS injection
RNG vs. PRNG vs. cryptographic RNG
High entropy passwords vs. low entropy
HSM vs. TEE
TLS v3 vs. SSL v3
Stack overflow, buffer overflow, and integer overflow / wraparound.
Certificate vs. key
Signature vs. hash
Desirable:
10. Basic understanding of software release pipelines: e.g., VCS, branching/tagging, GitOps, software signing, versioning, CI/CD.
11. Cybersecurity qualifications, such as Security+, CCSP, CISSP, CEH, etc.
12. Familiarity with Common Vulnerability Enumerations (CVE’s), Common Weakness Enumerations (CWE’s).
13. Familiarity with multiple operating systems, including Windows and Linux
14. Degree (or equivalent experience) in a STEM subject, particularly cybersecurity, computer science, software engineering, or electronic engineering.
15. Basic understanding of software architecture diagrams, attack vectors, and threat modelling, including an ability to create threat models and reason about attack vectors involving multiple vulnerabilities.
16. Basic understanding of asymmetric vs. symmetric cryptography
17. A skilled communicator, able to liaise with multiple levels of engineering and management staff
18. A reasonable degree of previous project / ticket management experience. E.g., SCRUM management, sprint reviews, etc.
#LI-Hybrid
#GOSIA