Vice President, Application Security Architect – Technology Risk – Advisory

At Yardstick Management, we create seats at tables in the world’s leading companies for underrepresented and marginalized individuals. Below, you will find positions we’re sourcing for our partners. These roles range from Manager to C-Suite level positions. We hope that by browsing through these opportunities, you will find your next career goal and we’ll help make that connection for you. We look forward to assisting in your search.

Vice President, Application Security Architect – Technology Risk – Advisory

Location

Atlanta, GA
}

Full Time

Full Time

Level

Director/Sr. Director

A leading global financial institution and services company, providing a broad range of innovation and collaborative solutions for cultivating environments and driving technology focused applications, resources and products in digitizing workflows and new strategies for their markets and clients. 

Position Description:

Led by the Chief Information Security Officer (CISO), Technology Risk secures our clients against hackers and other cyber threats. We are responsible for detecting and preventing attempted cyber intrusions against the firm, helping the firm develop more secure applications and infrastructure, developing software in support of our efforts, measuring cybersecurity risk, and designing and driving implementation of cybersecurity controls. The team has a global presence across the Americas, APAC, India and EMEA.

Within Technology Risk, Advisory is the consultative and technology subject matter expertise arm, responsible for assessing new technology initiatives for risk, partnering with engineers to architect and design secure products and services, embedding implementation reviews as part of the SDLC and CI/CD pipeline via code analysis and penetration testing, and guiding technology innovation in terms of security and control. The team plays a critical role in designing and assessing controls for our transition to building native public cloud applications.

In this role, you will be reviewing Software Architecture designs and helping identify detrimental architecture flaws earlier in the SDLC. You will be required to leverage your Application Security knowledge to guide developers and architects on how to build secure software on-prem and in the cloud. The ideal candidate should have 5+ years of prior experience performing Threat Modeling or Secure Design Reviews.

Key Roles and Responsibilities: 

  • Perform software architecture design reviews for on-prem or cloud deployments
  • Serve as an Application security liaison for the developers and architects in the respective Business Unit
  • Review security assessment reports from pentest and code review engagements
  • Conduct Read out Calls with the business to articulate risk and recommend a mitigation strategy
  • Develop secure architecture design patterns
  • Mentor other junior members of the team

Functional Background & Experience:

  •  5+ years’ experience in one or more technical roles (focusing in application security)
  • Prior experience in performing Threat Modeling or Secure Design Reviews
  • Knowledge of most common Application Security vulnerabilities – e.g., OWASP Top 10 and cloud security gaps
  • Familiarity with Security standards such as OWASP Testing Guide, OWASP ASVS, NIST and Sans top 20
  • Common security controls and how they apply to different designs and systems including but not limited to secure authentication, access controls, encryption (at rest/ in transit), IDS/IPS, DLP, malware etc.
  • Experience in application vulnerability assessment and penetration testing of web, thick-client, or mobile applications
  • Working knowledge of application security tools such as fuzzers, scanners, debuggers, decompilers, proxies, simulators, etc.
  • Familiarity with modern and common web stack technologies (e.g. HTTP, HTML5, AJAX, REST, etc.) and platforms (e.g. DropWizard, Springboot, AngularJS, React Tomcat, .Net, Sybase, MS SQL, MongoDB, etc.)
  • Familiarity with common cloud services, recommended security best practices and secure deployment patterns. AWS is preferred
  • Understanding of core cryptography concepts (Encryption, Hashing, HMAC, digital signatures) and how they are applied and attacked in web applications (e.g. TLS attacks, CBC attacks)
  • Ability to analyze protocols (OAuth, SAML, OIDC), flows and interactions in a system design to evaluate gaps
  • Ability to identify threats, abuse cases, and gaps in the design before it is implemented
  • Good written and oral communication to be able to articulate risks to both technical and management stakeholders.Experience in crafting custom proof of concept application exploits using testing tools/frameworks or scripting exploits in Python, Perl, JavaScript, Shell scripting, etc.
  • Knowledge of network, application and operating system security risk
  • MS. in Computer Science, System/Computer Engineering, Cyber-Security, or Information Security
  • Experience or trainings in related disciplines e.g. computer science, computer security, software development, system design, open source frameworks, encryption schemes, etc.
  • Experience doing architecture review of Mobile applications

Apply for this position

Demographic Data is Optional

Our business is founded on a mission to bring diversity, equity, and inclusion across business sectors and company leadership. At Yardstick, we celebrate diversity and welcome folks to be as open and candid to us in this process as they deem comfortable.

Individuals seeking employment at Yardstick Management partners’ organizations are considered without regards to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, or sexual orientation.

Any information you provide to us is purely informational to track the demographics of our applicants and talent community. If we ever report on this data, it will be in aggregate.