HamburgerMenu
hirist

Job Description

Description :


Role & Responsibilities :


Compliance and Governance :


Compliance Standards :


- Ensure adherence to GDPR, HIPAA, PCI DSS, and other standards.


- Maintain audit trails with AWS CloudTrail and Bitbucket Activity Logs.

Vulnerability Assessment, Penetration Testing (VAPT), and Hardening :

Assessments :

- Perform regular vulnerability assessments on AWS resources using tools like AWS Inspector, Nessus, or Qualys.

- Service Hardening : Apply AWS best practices to secure services like EC2, RDS, and S3.

- Encryption : Implement encryption in transit and at rest using AWS KMS and SSL/TLS.

Infrastructure Security :

Cloud Security :

- Use AWS services (Security Hub, GuardDuty, CloudTrail) and GCP tools (Security Command Center, IAM) to harden cloud environments.

- Automate infrastructure deployment with Terraform or AWS CloudFormation, ensuring security best practices.

- Scan IaC using Checkov, Terrascan, or AWS Config Rules.

Application Security :

SAST and DAST :

- Perform SAST during development to identify vulnerabilities early.

- Conduct DAST in staging or production using tools like Burp Suite, OWASP ZAP, or AppScan.

Android Security :

- Test Android apps using tools like MobSF, QARK, or Drozer.

- Ensure compliance with OWASP MSTG standards.

Ethical Hacking and Ransomware Testing :

- Ransomware Simulation : Simulate ransomware attacks to test recovery capabilities and data resiliency.

- Ethical Hacking : Perform ethical hacking exercises to assess system vulnerabilities and identify potential breaches

Threat Analysis & Threat Modeling :

- Conduct regular threat analysis to evaluate potential risks to cloud infrastructure and applications.

- Create and maintain threat models for applications, services, and infrastructure to identify attack vectors and mitigation strategies.

- Use tools like Microsoft Threat Modeling Tool, OWASP Threat Dragon, or custom modeling techniques to identify and prioritize risks.

Code Scanning :

- Use Bitbucket Code Insights for integrated security scan results in PRs.

- Monitor repositories for exposed credentials or sensitive data.

- Automate IaC scanning with tools like Checkov.

CI/CD and Code Security :

Secure Pipelines :

- Integrate Bitbucket Pipelines with AWS services for secure deployments.

- Automate security checks at each pipeline stage :

1.SAST (Static Application Security Testing) : Use tools like SonarQube.

2. DAST (Dynamic Application Security Testing) : Use tools like OWASP ZAP or Burp Suite.

- Dependency scanning using tools like OWASP Dependency-Check.

- Container security scanning for Docker images.

Code Scanning :

- Use Bitbucket Code Insights for integrated security scan results in PRs.

- Monitor repositories for exposed credentials or sensitive data.

- Automate IaC scanning with tools like Checkov.

API Security :

- Secure APIs with OAuth2, JWT tokens, and mutual TLS.

- Implement rate-limiting and throttling to prevent abuse.

- Integrate APIs with AWS Cognito or other identity providers for authentica

Monitoring and Incident Response :

Monitoring :

- Use AWS CloudWatch, GuardDuty, and Bitbucket monitoring features.

- Configure proactive alerts using PagerDuty or Slack for Bitbucket Pipelines.

Incident Response :

- Automate incident response workflows using AWS Systems Manager or AWS Lambda.

- Conduct regular incident response drills.

AWS IAM (Identity and Access Management) :

- Policy Design : Create and enforce least privilege access policies.

- Audits : Conduct regular audits of IAM roles, groups, and policies to ensure compliance and security.

- Federated Identity : Configure and manage federated identity with external IdPs (e.g., Okta, Azure AD).

Version Control Security :

- Manage repository access using roles (Admin, Developer, Read-Only).

- Enforce branch protection rules for PR reviews.

- Secure sensitive data using Bitbucket Pipelines environment variables.

CI/CD Pipeline Integration :

- Integrate Bitbucket Pipelines with security tools like SonarQube or Checkmarx.

- Automate dependency vulnerability checks.

- Use pre-commit hooks for code quality and security validation.

Expertise And Qualifications :


Key Tools and Technologies :


- Compliance and Governance

- GDPR, HIPAA, PCI DSS / AWS CloudTrail and Bitbucket Activity Logs

- Vulnerability Assessment, Penetration Testing (VAPT), and Hardening

- VAPT

- Infrastructure Security

- AWS services

- Application Security

- SAST / DAST

- Ethical Hacking and Ransomware Testing

- Ransomware attacks / system vulnerabilities

- Threat Analysis & Threat Modeling applications, services, and infrastructure

- Code Scanning

- SonarQube


- Checkmarx, OWASP ZAP

- Source Control

- Bitbucket, Git

- CI/CD

- Bitbucket Pipelines, Jenkins, GitLab CI/CD

- Cloud Security

- AWS Security Hub


- GuardDuty, GCP Security

- API Management

- WSO2 API Manager


- AWS API Gateway

info-icon

Did you find something suspicious?

Similar jobs that you might be interested in