What you will doLiaising with the Hardware/Firmware and Software engineering teams to schedule code reviews/scans as per guidelines outlined by JCI cyber Security Board.Working with Senior Cyber architect to run and discuss results of scans, assess where the risks lie, how best to mitigateWorking with the development team to address cyber risksBeing the gatekeeper and working with the development team and our customers ensuring that all products and solutions released to the market adhere to the latest security standards.How you will do itYou will work across multiple parallel project releases and work items and will have a strong desire to actively champion product cybersecurity best practices.
The ideal candidate will take ownership of issues and work on own initiative, driving work items to successful completion.
You will have good time-management and organizational skills and be a continual learner, aware of the ever-changing nature of cybersecurity and keen to stay on top of the latest developments.What we look forBasic familiarity with, and keen interest in, formal cybersecurity controls and best practices.
E.g., OWASP Top 10, NIST 800-53.Ability to liaise and negotiate amongst multiple product stakeholders, including:Engineering management, architects, and lead engineersProduct Security Incident Response Team (PSIRT)Global Cybersecurity architectsProduct ManagementSupplier Assessment TeamSite Reliability Engineering (SRE)Legal (Software Copyright / Licensing Compliance, Trade Compliance)Individual software and hardware engineersPrevious development experience, including familiarity with authentication, authorization, and SDKs and local and remote APIs.Basic networking experience and understandingUnderstanding of, including ability to reason about and explain common cybersecurity vulnerabilities.
E.g., can (to some extent) compare and contrast SOME of:Authentication vs. authorizationVulnerability vs. weaknessHashes vs. ciphersSQL injection vs. OS injectionRNG vs. PRNG vs. cryptographic RNGHigh entropy passwords vs. low entropyHSM vs. TEETLS v3 vs. SSL v3Stack overflow, buffer overflow, and integer overflow / wraparound.Certificate vs. keySignature vs. hashDesirable:Basic understanding of software release pipelines: e.g., VCS, branching/tagging, GitOps, software signing, versioning, CI/CD.Cybersecurity qualifications, such as Security+, CCSP, CISSP, CEH, etc.Familiarity with Common Vulnerability Enumerations (CVE's), Common Weakness Enumerations (CWE's).Familiarity with multiple operating systems, including Windows and LinuxDegree (or equivalent experience) in a STEM subject, particularly cybersecurity, computer science, software engineering, or electronic engineering.Basic understanding of software architecture diagrams, attack vectors, and threat modelling, including an ability to create threat models and reason about attack vectors involving multiple vulnerabilities.Basic understanding of asymmetric vs. symmetric cryptographyA skilled communicator, able to liaise with multiple levels of engineering and management staffA reasonable degree of previous project / ticket management experience.
E.g., SCRUM management, sprint reviews, etc.#LI-Hybrid#GOSIA