Application Security — Solution Delivery Advisor
Deloitte’s Cyber Risk Services help our clients to be secure, vigilant, and resilient in the face of an ever-increasing array of cyber threats and vulnerabilities. Our Cyber Risk practice helps organizations with the management of information and technology risks by delivering end-to-end solutions using proven methodologies and tools in a consistent manner. Our services help organizations to address, in a timely manner, pervasive issues, such as identity theft, data security breaches, data leakage, cyber security, and system outages across organizations of various sizes and industries with the goal of enabling ongoing, secure, and reliable operations across the enterprise.
Deloitte’s Cyber Risk Services have been recognized as a leader by a number of independent analyst firms. Kennedy Consulting Research & Advisory, a leading analyst firm, recently named Deloitte a global leader in cyber security consulting. Source: Kennedy Consulting Research & Advisory; Cyber Security Consulting 2013; Kennedy Consulting Research & Advisory estimates © 2013 Kennedy Information, LLC. Reproduced under license.
Work you will do
As a Consultant in the hybrid operate business, you are responsible for adhering to the defined operating procedures and guidelines in operating the application security services in the Managed Services model, which includes the following:
o Understand and be compliant with the Service Level Agreements defined for the DevSecOps services;
o Understand and deep knowledge of application security engineering principles, and helping client’s development team and function to follow secure development practices which includes primarily monitoring and performing the security design review, architecture review, threat modeling, security testing, secure code review, secure build processes;
o Well versed with the application deployment and configuration baselines, and understanding of how the application environment operates in a secure environment and how exceptions are handled during operations;
o Facilitate use of technology-based tools or methodologies to continuously improve the monitoring, management and reliability of the service;
o Perform manual and automated security assessment of the applications;
o Involved in triaging and defect tracking process with the development team and helping the team to fix issues at the code level based on the priority of the tickets;
o Be a liaison between the Application development and infrastructure team, and integrate the processes between infrastructure monitoring and operations processes with the secure development/testing and management processes;
o Identifying, researching and analyzing application security events which may include emerging and existing persistent threats to the client's environment; and
o Performing active monitoring and tracking of application related threat actors and tactics, techniques and procedures (TTPs), that could likely cause an impact to client organization
The team
Deloitte’s DevSecOps is a standardized process, to help clients with large development functions, and application dependencies for their day-to-day operations. The process enables the client to address key vulnerabilities and risks associated with their various application environment at different stages of their development lifecycle.
At the core of our Application Security Managed Services Team professionals monitors, collects and analyses security related issues on application environment (both at code level and infrastructure level), that may potentially become a threat to an organization. This detection of application threats/vulnerabilities is carried out using a unique blend of our application security testing and monitoring tools and intelligence data collected through our vast experience within the Advice and Implement business.
Required:
· Minimum of 3-5years’ experience in application security development, security testing, deployment and security
management phases;
· Deep interest in application specific vulnerabilities, code development and infrastructure knowledge;
· Investigative and analytical problem-solving skills;
· Experience in collecting, analyzing, and interpreting qualitative and quantitative data from defined application security services related sources (tools, monitoring techniques etc.)
· Knowledge and experience of OWASP Top 10, SANS Secure Programming, Security Engineering Principles;
· Hands-on experience in performing code review of dot Net, Java and Swift and objective C code;
· Hands-on experience in running, installing and managing SAST, DAST , SCA and IAST solutions, such as Checkmarx, Fortify and Contrast in large enterprise
· Understanding of leading vulnerability scoring standards, such as CVSS, and ability to translate vulnerability severity as security risk;
· Hands-on experience on at least one CI/CD tool set and building pipelines using Team city, Bamboo, Jenkins, Chef, Puppet, selenium, AWS and AZURE DevOps;
· Hands on experience on container technology such as Kubernetes, Dockers, AKS, EKS.
· Knowledge of cloud environments and deployment solutions such as server less computing;
· Hands on experience in penetration testing of mobile, desktop and web applications;
· Must have experience in writing custom exploitation scripts and utilities;
· Possession of excellent oral and written communication skill;
· Knowledge of one or more scripting languages for automation and complex searches;
· Must have cloud security specialization in Security; and
· Certification such as EC-Council CEH (Certified Ethical Hacker), DevSecOps Professional (CDP) , ISC2 Certified Cloud Security Professional (CCSP), Certified API Security Professional (CASP) , CTMP (Certified Threat Modeling Professional) etc. are preferred.
Preferred:
· Bachelor’s in computer science or other technical fields;
· Experience in cloud service providers such as AWS, GCP, Azure, Oracle are preferred
· Experience in implementing and managing security measures within Kubernetes environments, designing and enforcing advanced security protocols for API infrastructure, managing and optimizing our containerized applications using Docker, automating and managing our infrastructure as code using Terraform, automating IT processes and configurations using Ansible, and identifying and mitigating potential security threats through comprehensive threat modeling practices.
· Solid and demonstrable comprehension of Information Security including OWASP/SANS, Security Test Case development (or mis-use case).
· Understanding of security essentials including; networking concepts, defense strategies, and current security technologies
· Ability to research and characterize security threats to include identification and classification of application related threat indicators
Shift Timings:
- Rotational night shifts are a pre-requisite
- The role may require Permanent night shifts basis Client/Project demands
Application Security — Solution Delivery Advisor
Deloitte’s Cyber Risk Services help our clients to be secure, vigilant, and resilient in the face of an ever-increasing array of cyber threats and vulnerabilities. Our Cyber Risk practice helps organizations with the management of information and technology risks by delivering end-to-end solutions using proven methodologies and tools in a consistent manner. Our services help organizations to address, in a timely manner, pervasive issues, such as identity theft, data security breaches, data leakage, cyber security, and system outages across organizations of various sizes and industries with the goal of enabling ongoing, secure, and reliable operations across the enterprise.
Deloitte’s Cyber Risk Services have been recognized as a leader by a number of independent analyst firms. Kennedy Consulting Research & Advisory, a leading analyst firm, recently named Deloitte a global leader in cyber security consulting. Source: Kennedy Consulting Research & Advisory; Cyber Security Consulting 2013; Kennedy Consulting Research & Advisory estimates © 2013 Kennedy Information, LLC. Reproduced under license.
Work you will do
As a Consultant in the hybrid operate business, you are responsible for adhering to the defined operating procedures and guidelines in operating the application security services in the Managed Services model, which includes the following:
o Understand and be compliant with the Service Level Agreements defined for the DevSecOps services;
o Understand and deep knowledge of application security engineering principles, and helping client’s development team and function to follow secure development practices which includes primarily monitoring and performing the security design review, architecture review, threat modeling, security testing, secure code review, secure build processes;
o Well versed with the application deployment and configuration baselines, and understanding of how the application environment operates in a secure environment and how exceptions are handled during operations;
o Facilitate use of technology-based tools or methodologies to continuously improve the monitoring, management and reliability of the service;
o Perform manual and automated security assessment of the applications;
o Involved in triaging and defect tracking process with the development team and helping the team to fix issues at the code level based on the priority of the tickets;
o Be a liaison between the Application development and infrastructure team, and integrate the processes between infrastructure monitoring and operations processes with the secure development/testing and management processes;
o Identifying, researching and analyzing application security events which may include emerging and existing persistent threats to the client's environment; and
o Performing active monitoring and tracking of application related threat actors and tactics, techniques and procedures (TTPs), that could likely cause an impact to client organization
The team
Deloitte’s DevSecOps is a standardized process, to help clients with large development functions, and application dependencies for their day-to-day operations. The process enables the client to address key vulnerabilities and risks associated with their various application environment at different stages of their development lifecycle.
At the core of our Application Security Managed Services Team professionals monitors, collects and analyses security related issues on application environment (both at code level and infrastructure level), that may potentially become a threat to an organization. This detection of application threats/vulnerabilities is carried out using a unique blend of our application security testing and monitoring tools and intelligence data collected through our vast experience within the Advice and Implement business.
Required:
· Minimum of 3-5years’ experience in application security development, security testing, deployment and security
management phases;
· Deep interest in application specific vulnerabilities, code development and infrastructure knowledge;
· Investigative and analytical problem-solving skills;
· Experience in collecting, analyzing, and interpreting qualitative and quantitative data from defined application security services related sources (tools, monitoring techniques etc.)
· Knowledge and experience of OWASP Top 10, SANS Secure Programming, Security Engineering Principles;
· Hands-on experience in performing code review of dot Net, Java and Swift and objective C code;
· Hands-on experience in running, installing and managing SAST, DAST , SCA and IAST solutions, such as Checkmarx, Fortify and Contrast in large enterprise
· Understanding of leading vulnerability scoring standards, such as CVSS, and ability to translate vulnerability severity as security risk;
· Hands-on experience on at least one CI/CD tool set and building pipelines using Team city, Bamboo, Jenkins, Chef, Puppet, selenium, AWS and AZURE DevOps;
· Hands on experience on container technology such as Kubernetes, Dockers, AKS, EKS.
· Knowledge of cloud environments and deployment solutions such as server less computing;
· Hands on experience in penetration testing of mobile, desktop and web applications;
· Must have experience in writing custom exploitation scripts and utilities;
· Possession of excellent oral and written communication skill;
· Knowledge of one or more scripting languages for automation and complex searches;
· Must have cloud security specialization in Security; and
· Certification such as EC-Council CEH (Certified Ethical Hacker), DevSecOps Professional (CDP) , ISC2 Certified Cloud Security Professional (CCSP), Certified API Security Professional (CASP) , CTMP (Certified Threat Modeling Professional) etc. are preferred.
Preferred:
· Bachelor’s in computer science or other technical fields;
· Experience in cloud service providers such as AWS, GCP, Azure, Oracle are preferred
· Experience in implementing and managing security measures within Kubernetes environments, designing and enforcing advanced security protocols for API infrastructure, managing and optimizing our containerized applications using Docker, automating and managing our infrastructure as code using Terraform, automating IT processes and configurations using Ansible, and identifying and mitigating potential security threats through comprehensive threat modeling practices.
· Solid and demonstrable comprehension of Information Security including OWASP/SANS, Security Test Case development (or mis-use case).
· Understanding of security essentials including; networking concepts, defense strategies, and current security technologies
· Ability to research and characterize security threats to include identification and classification of application related threat indicators
Application Security — Solution Delivery Advisor
Deloitte’s Cyber Risk Services help our clients to be secure, vigilant, and resilient in the face of an ever-increasing array of cyber threats and vulnerabilities. Our Cyber Risk practice helps organizations with the management of information and technology risks by delivering end-to-end solutions using proven methodologies and tools in a consistent manner. Our services help organizations to address, in a timely manner, pervasive issues, such as identity theft, data security breaches, data leakage, cyber security, and system outages across organizations of various sizes and industries with the goal of enabling ongoing, secure, and reliable operations across the enterprise.
Deloitte’s Cyber Risk Services have been recognized as a leader by a number of independent analyst firms. Kennedy Consulting Research & Advisory, a leading analyst firm, recently named Deloitte a global leader in cyber security consulting. Source: Kennedy Consulting Research & Advisory; Cyber Security Consulting 2013; Kennedy Consulting Research & Advisory estimates © 2013 Kennedy Information, LLC. Reproduced under license.
Work you will do
As a Consultant in the hybrid operate business, you are responsible for adhering to the defined operating procedures and guidelines in operating the application security services in the Managed Services model, which includes the following:
o Understand and be compliant with the Service Level Agreements defined for the DevSecOps services;
o Understand and deep knowledge of application security engineering principles, and helping client’s development team and function to follow secure development practices which includes primarily monitoring and performing the security design review, architecture review, threat modeling, security testing, secure code review, secure build processes;
o Well versed with the application deployment and configuration baselines, and understanding of how the application environment operates in a secure environment and how exceptions are handled during operations;
o Facilitate use of technology-based tools or methodologies to continuously improve the monitoring, management and reliability of the service;
o Perform manual and automated security assessment of the applications;
o Involved in triaging and defect tracking process with the development team and helping the team to fix issues at the code level based on the priority of the tickets;
o Be a liaison between the Application development and infrastructure team, and integrate the processes between infrastructure monitoring and operations processes with the secure development/testing and management processes;
o Identifying, researching and analyzing application security events which may include emerging and existing persistent threats to the client's environment; and
o Performing active monitoring and tracking of application related threat actors and tactics, techniques and procedures (TTPs), that could likely cause an impact to client organization
The team
Deloitte’s DevSecOps is a standardized process, to help clients with large development functions, and application dependencies for their day-to-day operations. The process enables the client to address key vulnerabilities and risks associated with their various application environment at different stages of their development lifecycle.
At the core of our Application Security Managed Services Team professionals monitors, collects and analyses security related issues on application environment (both at code level and infrastructure level), that may potentially become a threat to an organization. This detection of application threats/vulnerabilities is carried out using a unique blend of our application security testing and monitoring tools and intelligence data collected through our vast experience within the Advice and Implement business.
Required:
· Minimum of 3-5years’ experience in application security development, security testing, deployment and security
management phases;
· Deep interest in application specific vulnerabilities, code development and infrastructure knowledge;
· Investigative and analytical problem-solving skills;
· Experience in collecting, analyzing, and interpreting qualitative and quantitative data from defined application security services related sources (tools, monitoring techniques etc.)
· Knowledge and experience of OWASP Top 10, SANS Secure Programming, Security Engineering Principles;
· Hands-on experience in performing code review of dot Net, Java and Swift and objective C code;
· Hands-on experience in running, installing and managing SAST, DAST , SCA and IAST solutions, such as Checkmarx, Fortify and Contrast in large enterprise
· Understanding of leading vulnerability scoring standards, such as CVSS, and ability to translate vulnerability severity as security risk;
· Hands-on experience on at least one CI/CD tool set and building pipelines using Team city, Bamboo, Jenkins, Chef, Puppet, selenium, AWS and AZURE DevOps;
· Hands on experience on container technology such as Kubernetes, Dockers, AKS, EKS.
· Knowledge of cloud environments and deployment solutions such as server less computing;
· Hands on experience in penetration testing of mobile, desktop and web applications;
· Must have experience in writing custom exploitation scripts and utilities;
· Possession of excellent oral and written communication skill;
· Knowledge of one or more scripting languages for automation and complex searches;
· Must have cloud security specialization in Security; and
· Certification such as EC-Council CEH (Certified Ethical Hacker), DevSecOps Professional (CDP) , ISC2 Certified Cloud Security Professional (CCSP), Certified API Security Professional (CASP) , CTMP (Certified Threat Modeling Professional) etc. are preferred.
Preferred:
· Bachelor’s in computer science or other technical fields;
· Experience in cloud service providers such as AWS, GCP, Azure, Oracle are preferred
· Experience in implementing and managing security measures within Kubernetes environments, designing and enforcing advanced security protocols for API infrastructure, managing and optimizing our containerized applications using Docker, automating and managing our infrastructure as code using Terraform, automating IT processes and configurations using Ansible, and identifying and mitigating potential security threats through comprehensive threat modeling practices.
· Solid and demonstrable comprehension of Information Security including OWASP/SANS, Security Test Case development (or mis-use case).
· Understanding of security essentials including; networking concepts, defense strategies, and current security technologies
· Ability to research and characterize security threats to include identification and classification of application related threat indicators
Shift Timings:
- Rotational night shifts are a pre-requisite
- The role may require Permanent night shifts basis Client/Project demands