and prioritize security audits, vulnerability scans, and reviews (including access rights, firewall rules, cloud compliance... Responsibilities in Incident Response and Vulnerability Management: Assist the RISO in incident response activities by investigating...
servers, clusters, and networking configurations. Security: Knowledge of security best practices, vulnerability management...
and mitigation of training-time and inference-time threats LLM vulnerability scanner and guardrails Agentic AI Security... tools for agentic AI systems Vulnerability scanners and guardrails for Agents Ethical AI, Bias Mitigation & Compliance...
BurpSuite OWASP ZAP Kali Linux Able to explain IDOR Second Order SQL Injection CSRF Vulnerability Root cause Remediation... Program,DevSecOps automation - Jenkins, Ansible. Terraform, GitLab,Infra Vulnerability Management - Qualys,Infra Vulnerability...
of infrastructure automation, including access controls, vulnerability management, and compliance. Performance Optimization: Identify...
- Creating Jenkins/ADO pipelines, SonarQube scans, JFrog vulnerability remediation Preferred: · Experience with CI/CD...
actions, and CI/CD pipelines to perform a set of assurance functions such as vulnerability scanning, signature validation...
– Creating Jenkins/ADO pipelines, SonarQube scans, JFrog vulnerability remediation Preferred: · Experience with CI/CD...
Container Security Preferred Skills : Application Security,Vulnerability Management,Application Security->Vulnerability... Assessment/Penetration Testing,Application Security->Nessus,Application Security->Vulnerability Management,Application...
dependency management, vulnerability scanning), artifact repository management (Nexus, Artifactory) and build performance..., comprehensive, and security focused documentation for all CI/CD processes, infrastructure, and security controls. Vulnerability...
and manage the Vendor Risk Management (VRM) program. Oversee periodic penetration test reviews, vulnerability risk scoring...
by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated...
policies, security groups, encryption standards, and compliance controls. Conduct regular security audits, vulnerability...
policies, security groups, encryption standards, and compliance controls. Conduct regular security audits, vulnerability...
by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated...
What Will Make You Stand Out (Preferred Qualifications) Familiarity with cybersecurity products (e.g., SIEM, vulnerability...
reviews, manual code reviews, and exploit writing. Conduct system security and vulnerability analyses, provide risk...
. Conduct vulnerability assessments and penetration testing. Develop, implement, and enforce security policies and procedures...
from vulnerability management, configuration assessments, and monitoring tools to identify emerging risks Support threat modeling... analysis, including reviewing system designs, interpreting vulnerability data, or assessing configuration and access control...
Familiarity with static and dynamic analysis tools, including vulnerability scanning suites Life at Docusign Working...