Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Background
- There is a requirement to ensure the product security and compliance for one of the buisness area in client.
- The scope of the consultant services is to assist client in
- Assess and provide advice and support on security and privacy controls throughout the software design and acquisition process.
- -Support the implementation of cyber security and data privacy frameworks, securing compliance with laws and regulations.
- • Perform CSP risk analyses, maturity assessments, and threat modelling exercises.
- • Support in security controls in the cloud infrastructure and products (Primarily in Azure) and Support cloud security posture improvements in Azure.
- • Translate security and privacy findings into actionable risks that the business can use to make informed and conscious decisions.
- • Identify and analyze vulnerabilities in networks, applications, and infrastructure.
- Requirements:
- Desired knowledge, experience, competence, skills etc
- Understanding of Product Architecture:
- Ability to evaluate threat surfaces in APIs, cloud-native systems, and IoT products.
- Deep familiarity with microservices, containers (Docker/Kubernetes), and edge devices.
- Cloud Security Design:
- Expertise in securing AWS, Azure, or GCP architectures (IAM, encryption, secrets management).
- Zero Trust & Secure Design Principles:
- Applying least privilege, defense-in-depth, and secure-by-design principles across product lifecycles.
- Secure Software Development Lifecycle (SSDLC):
- Experience embedding security controls and checks into CI/CD pipelines.
- Understanding of threat modeling (STRIDE, PASTA, LINDDUN).
- Code review for security flaws (esp. in Python, Java, C/C++, or Go).
- Vulnerability Management:
- Expertise in identifying, triaging, and remediating product vulnerabilities.
- Familiarity with CVSS scoring and vulnerability disclosure processes.
- Regulatory Alignment:
- Understanding of ISO 27001, SOC 2, NIST CSF, GDPR, .
- Security Risk Assessment:
- Translating technical vulnerabilities into business impact.
- Supporting product managers and developers in risk-based prioritization.
- What 3 things from the box above are most important?
- Security Architecture
- Cloud Security Design
- Security Risk Assessment:
Key Skills
Ranked by relevanceReady to apply?
Join Europa Search and take your career to the next level!
Application takes less than 5 minutes

