CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Jobs

Application Security Design Architect

Fivesky

Reading Time: 1 min read
in Jobs

 

Job Description: 

Have you worked side by side with teams gathering and documenting information so that they can perform architectural reviews? Are you familiar with the SDLC?  Then you might be Fivesky’s next Application Security Design Architect.

Your Responsibilities:

  • Perform technical assessments, security consulting, and design reviews, to highlight risk, helping internal teams and partners improve security.
  • Create, maintain, and conduct auditing requests against formalized Enterprise Security requirements.
  • Meet with project managers, and subject matter experts to develop an in-depth plan to bring the acquisition up to company-established standards.
  • Follow the established best practices, documentation efforts, and remediation plans concerning acquired applications.
  • Collaborate amongst teams to enhance the Enterprise Security Team’s ability to make decisions based on multi-team feedback.
  • It would be awesome if you had reverse engineering, hosted cloud, and testing skills.

 

 

US Located Required:  Yes

Location: Alpharetta, GA

Schedule: Full time

 

Apply Now

Tags: Application Security Design ArchitectFiveskyGeorgiaIn PersonJobsSenior PositionUnited States
ADVERTISEMENT

Related Posts

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

January 12, 2023
XOR Security – Cyber Hunt/Deception Operations SME

XOR Security – Cyber Hunt/Deception Operations SME

January 12, 2023
Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

January 12, 2023
ITW – IT Security Analyst

ITW – IT Security Analyst

January 12, 2023

More Articles

Quotes

“Depending on their specific requirements”

January 25, 2022

YubiHSM 2 – Hardware

April 15, 2022
Tool

Health Care Compliance Automation Module

April 5, 2022
Alerts

Apple Releases Security Updates

July 21, 2021
Blog

10 Cybersecurity Courses for 2021

January 5, 2021
Certification

DPO Certification

March 24, 2022
Course

The Gramm–Leach–Bliley Act (GLBA) Made Simple

June 14, 2022

AST Cybersecurity podcast

August 9, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.