Required Skills

Cyber Security Engineer

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 13th Mar 2025

JOB DETAIL

· Proven experience (2 years) in application security, with a strong understanding of application vulnerabilities and secure coding practices.

· Familiarity with web application security concepts, technologies, and frameworks (e.g., HTTP, SSL/TLS, OWASP, etc.).

· Experience with security testing tools and methodologies, such as SAST, DAST, or secure code review tools.

· Proficiency in programming languages commonly used in application development, such as Java, .NET, Python, or JavaScript.

· Strong analytical and problem-solving skills, with the ability to effectively assess and communicate application security risks.

· Excellent written and verbal communication skills, with the ability to collaborate with cross-functional teams and explain complex security concepts to non-technical stakeholders.

· Knowledge of application security controls: Secure coding practices, Authentication and Authorization, Input Validation, Encryption, Logging and Auditing, Vulnerability Management, Penetration Testing, Secure Software Development Lifecycle (SDLC), Access Control, Patch Management, Artificial Intelligence (AI) and Machine Learning (ML).

· Knowledge of various technical frameworks and concepts (MITRE ATT&CK, CIS, Kill Chain, etc)

· Experience working in a highly regulated environment.

· Ability to express complex technical concepts in business terms.

· Organized and detail-oriented, able to work well under deadlines in a changing environment and complete multiple projects effectively and concurrently.

· Evaluate effectiveness of the internal security control framework and recommend adjustments as business needs change.

· Regularly interact with all levels of management to present and discuss control effectiveness.

· Review and coordinate changes to cyber security policies, procedures, and standards.

Company Information