Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Champion DevSecOps through Security Automation: Leverage your full-stack development expertise to design, implement, and maintain security tools and automation. This includes building scripts to automate critical tasks like data security checks, vulnerability scanning, and user access control, streamlining security processes and improving overall efficiency.
- Monitor and analyze security events: You'll be responsible for monitoring security information and event management (SIEM) tools to identify potential threats and suspicious activity. Along with determine security gaps in these controls to improve overall security posture. This will also involve analyzing logs, investigating alerts, and using your knowledge of security frameworks (NIST, CIS, CISA) to assess risk.
- Support secure application development: You'll collaborate with developers to ensure secure coding practices are followed throughout the Software Development Lifecycle (SDLC). This might involve code reviews, threat modeling, and providing guidance on secure development principles.
- Investigate and respond to security incidents: In the event of a security breach, you'll be part of the incident response team, helping to identify the root cause, mitigate damage, and implement recovery procedures.
- Document security procedures and best practices: You'll develop clear and concise documentation for security policies, procedures, and best practices.
- Provide on-call support when needed and other related duties as required.
- Exceptional communication and interpersonal skills, with a proven ability to deliver exceptional customer service through training and documentation.
- 5 years of Expert level experience with C#, Python, powershell, and rust (is a plus)
- Understanding of secure by design principles.
- 1 year of Understanding of automation principles, including the use of AI, ML, and scripting, to streamline security tasks.
- 3 years of Understanding of the Software Development Lifecycle (SDLC) and DevSecOps principles to integrate security considerations
- 3 years of Proficiency in cloud security principles, including identity and access management, data security, and compliance.
- 1 Year of Experience with SIEM (Security Information and Event Management) tools, including configuration, tuning, threat hunting, and alert creation.
- 1 Year of In-depth knowledge of security frameworks, including NIST, CIS, and CISA, and their application in a hybridenvironment.
- Solid understanding of incident response processes and experience in implementing them effectively.
- Advanced understanding of security controls, including their configuration and implementation in hybrid environments.
- 1 Year of Expertise in data, classification and DLP (Data Loss Prevention) configuration to safeguard sensitive information.
A bachelor's degree in information technology systems, computer science, cybersecurity, or a related field. Relevant experience may be substituted for the degree on a year-for-year basis
Preferred Certifications:
Not required, however we prioritize applicants who have:
Certified Incident Handler (GCIH)
Certified Computer Security Incident Handler (CSIH)
EC-Council Certified Incident Handler (ECIH)
EC-Council Certified Network Defender (CND)
GIAC Critical Infrastructure Protection (GCIP)
GIAC Defensible Security Architecture (GDSA)
Key Skills
Ranked by relevanceReady to apply?
Join TALENT Software Services and take your career to the next level!
Application takes less than 5 minutes