App Security, Manual Secure Code review – USC or GCH, D

Application Security USC or GCH, remote in Tampa or Jersey City, Manual Secure Code Review, OWASP, Strong knowledge of Java, Angular/Node JS, Javascript, Python, Ruby, Web/Non-web, Cloud
  • Location: Coppell, Texas
  • Type: True Contract To Hire
  • Job #4487

Brief Overview

Application Security USC or GCH, remote in Dallas or Jersey City, Manual Secure Code Review, OWASP, Strong knowledge of Java, Angular/Node JS, Javascript, Python, Ruby, Web/Non-web, Cloud

=============================

Why work with me?

Experienced staffing professional, knows client corporate culture/hiring manager, resume and interview preparation, most ethical person in the business, but only works with like-minded people . . .

Full contact information on LI Profile http://www.linkedin.com/in/kathleengriffiths/ reach out anytime

Position Summary

The Application Security – Manual Secure Code Review Consultant is responsible for the Manual secure code review and assessment of in-house developed source code of Web/Non-web and cloud apps, API’s using manual approach primarily, develop and leverage custom scripts and tools as required. The individual should possess strong knowledge of Secure coding principles across widely used programming languages (Java, Angular/Node JS, Java Script, Python, Ruby etc.) along with excellent communication, analysis and organizational skills.  Interaction with developers (Application Development) to gather application source code details, conduct code review and provide technical assistance in remediating application security issues will be part of the responsibilities

Skills Required and Responsibilities

  • Proficient in secure coding standards and manual review of code to identify OWASP Top 10 vulnerabilities and SANS Top 25 Programming errors.
  • Strong knowledge of security frameworks (OWASP, SANS CWE), secure coding practices, information security principles & architecture and industry specific auditory frameworks
  • Experience with common web stack technologies (e.g. HTTP, HTML5, AJAX, REST, etc.) and platforms (e.g. Tomcat, .Net, MS SQL, etc.).
  • Understanding of core cryptography concepts (encryption, hashing, HMAC, digital signature) and how they are applied and attacked in web applications (e.g. TLS attacks, CBC attacks).
  • Experience in crafting custom proof of concept application exploits using testing tools/frameworks or scripting exploits in Python, Perl, JavaScript, Shell scripting, etc.
  • Understanding of Authentication, Authorization mechanism programmatically across different web technologies and protocols (SSL/TLS, REST, OAuth, SAML etc.)
  • Knowledge on Application development using technologies like Java, J2EE, Groovy, Ruby, Angular JS, Node JS, Java Script, Python.
  • Should have a solid understanding of security controls and how they apply to different designs and systems.
  • Understand, highlight and articulate risk to product owners in an understandable language.
  • Knowledge of DevSecOps and development pipeline integration and automation.
  • Knowledge in Cloud and Containers infrastructure. AWS, Azure and docker experience is a plus.
  • Document vulnerabilities and work with developers on vulnerability mitigation
  • Perform re-reviews to validate the fixes on the reported vulnerabilities.
  • Provide excellent coordination with local teams (which includes vendor consultants), onsite team and various other support teams in organization
  • Provides regular status updates on all assigned tasks and deliverables.
  • Attend meetings with all involved stakeholders from TRM and IT leads to provide updates and de-brief when required.

 

Attach a resume file. Accepted file types are DOC, DOCX, PDF, HTML, and TXT.

We are uploading your application. It may take a few moments to read your resume. Please wait!

Submit Resume

Why work with me?

Experienced staffing professional, knows client corporate culture/hiring manager, resume and interview preparation, most ethical person in the business, but only works with like-minded people . . .

Full contact information on LI Profile http://www.linkedin.com/in/kathleengriffiths/ reach out anytime