Required Skills

Threat Modeling Tools methodologies Application Development experience Secure code reviews Vulnerability assessment scoring. Tools & Pratices SAST DAST SCA OWASP NIST Audits Process Documentation

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 24th Dec 2024

JOB DETAIL

Bachelor’s degree in Computer Science, Information Technology, or a related field with 10+ years of experience.

•Proven 5+ yrs experience in cybersecurity engineering, project management, and threat modeling.

•Experience in product cybersecurity risk assessments in regulated industry like Healthcare (Medical device / Diagnostic devices)

•Strong understanding of ISO 27001 ISMS and other global security standards

•Lead and manage cybersecurity projects, ensuring they are completed on time and within scope.

•Design, implement, and maintain robust security engineering solutions.

•Conduct threat modeling to identify and mitigate potential security risks.

•Support and conduct audits to maintain high-quality security practices.

•Stay informed about the latest cybersecurity threats and trends to proactively address potential risks.

•Collaborate with cross-functional teams to integrate security measures into all processes.

•Provide expertise on the regulatory landscape for cybersecurity requirements in medical devices.

•Develop and implement secure lifecycle practices across all stages of product development.

•Create and execute comprehensive cybersecurity strategies to protect organizational assets.

•Manage cybersecurity projects, ensuring timely and effective delivery.

•Support internal and external audits by providing necessary documentation and insights.

•Ensure all business units and sites are brought up to the same cybersecurity standards.

•Oversee remediation efforts across different sites and products,

•Work with Systems Engineering, Software Development, Regulatory and other stakeholders to develop and document cybersecurity controls.

Company Information