*Dear Partners,* *Hope you are doing well,*
*Please go through the below job description and let me know if you have anyone.* *Thank you..!* *Full Name:* *Email ID:* *Contact Number:* *Current location:* *Relocation:* *Availability:* *Visa Status:* *Rate:* *Face2Face Interview (Y/N):* *Skype ID:* *Job Description : * Application Security Engineer Ann Arbor,MI Contract or C2H or PERM Phone& F2F USC or GC holders only *OVERVIEW* Our client continues to mature the information security program, we recognize the value of an application security specialist as one of the key enablers of such a program. Seeking an experienced web application security specialist to join the Information Security Team. The role entails serving as a security advisor at the design stage, performing analysis, and following up with developers to ensure flaws are fixed before code is released to production. The role also includes proactive analysis of frameworks and technologies used to anticipate vulnerability classes as well as techniques to mitigate them. The candidate will be most proficient in performing manual pentests with aid from industry standard open-source, COTS and custom developed tools. The continual drive to learn new techniques and technologies to expand one’s skillset – as well as the ability to share that information with key team members is essential. Additionally, the candidate will be capable of developing exploit code to demonstrate to developers how to take advantage of vulnerabilities that are discovered, as well as demonstrating to developers, web security engineers, system engineers and senior management post-exploitation behavior (goals, tactics, etc.) of real-world attackers. While most assessments will be focused on Internet facing web applications, assessments of third-party vendor websites will also be in scope, as well as assessments of high-risk internal web applications. *Responsibilities and Duties (% must equal 100%)* *Responsibility #1 (67%) Application Security Program Support* ·Participate in security testing and assessments and/or work with development and QA teams to develop comprehensive security test suites and processes. ·Evaluate and prioritize newly discovered or reported software and implementation vulnerabilities by severity and risk. ·Interact with other departments to communicate status and prioritization of open vulnerabilities and understand the current state of vulnerability remediation to ensure application vulnerabilities are resolved within defined SLA periods. ·Develop, maintain, and report quality metrics on application vulnerability status, trends, and level of risk. ·Create training or informational materials for development teams on common application vulnerability types (i.e. threats posed, causes, fixes and avoidance, testing for, etc.) ·Work closely with Information Security Compliance to ensure that application is SOX and PCI compliant. Responsibility #2 (33%) Application Security Analysis and Maintenance ·Import and analyze static code analysis reports for internally developed applications. ·Maintain demonstrable knowledge of current vulnerability exploitation techniques. ·Maintain dynamic and static analysis toolsets to ensure scans are accurate and running regularly ·Collaborate with 3rd party security product and service vendors to track and understand open security issues and effectively apply security tools to the application environment. *Required Skills* · Secure Software Development Architecture, Design, and Methodologies · Source Code Review (Automated and Manual) · A deep understanding of both SOAP and RESTful APIs · A deep understanding of Security frameworks and regulations (OWASP, PCI) · Strong understanding of transport level encryption · Application and Mobile vulnerability scanning and penetration testing · A common understanding of OAuth and SAML protocols · An understanding of application reverse engineering (Web and Mobile) · Must have experience in at least two of the following tools: (BurpSuite, Qualys, Acunetix, AppScan, Cenzic, WebInspect, Fortify, Veracode) · Understanding of continuous integration methodology and experience associated tools · Proficient in Java and .NET programming languages · Experience with web and application servers such as IIS, Tomcat, and Nginx. · Strong knowledge of common vulnerabilities and exploitation techniques · Must have experience writing technical documentation · An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business · An understanding of organizational mission, values, and goals and consistent application of this knowledge · Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one *Qualifications * · A bachelor's or master's degree in computer science, information systems or other related field; or equivalent work experience. · 8 to 10 years of combined IT and security work experience, with 5+ years of experience in information security, especially in an application security role. · Certified Information Systems Security Professional (CISSP) or Certified Secure Software Lifecycle Professional (CSSLP) desired Thanks & Regards, Vinay Kumar IT Recruiter Osair Technologies LLC | Desk: 703-349-5631 vinayku...@osairtech.com <van...@osairtech.com> -- You received this message because you are subscribed to the Google Groups "oraapps" group. To unsubscribe from this group and stop receiving emails from it, send an email to oraapps+unsubscr...@googlegroups.com. To post to this group, send email to oraapps@googlegroups.com. Visit this group at https://groups.google.com/group/oraapps. For more options, visit https://groups.google.com/d/optout.