Salary: 140 – $168K
Location: Tempe, AZ, Relocation is available
Matthew Noah is seeking to build relationships with application security architects for a premier employer located in Tempe, AZ, that's moving the payment industry forward.
When we partner with talent, we learn not just your skills and background, but the many layers of your spirit – your life aspirations, your career goals, and how you find a sense of purpose. After we map out how to make your ideal life your real life, we find the team that can take you there.
If the description below sounds like a great fit and if you're looking for a fresh experience with your job search, then we encourage you to reach out to discuss what the right path for you is.
The Application Security Architect will be responsible for endeavors such as auditing code, architecture, and databases used in custom-developed web and cloud applications, to testing for common application-level vulnerabilities, weaknesses, and providing both vulnerability analysis and development advise for application hardening.
The Application Security Architect will possess a strong background in software development, secure coding techniques, secure architecture, software security frameworks, common weaknesses, and vulnerability analysis. This individual should have experience securing web and mobile applications, APIs, micro-services, containers, cloud, and cloud-hybrid architectures.
Working with application development and QA teams across multiple products to: Review, evaluate and prioritize vulnerability findings
Provide SME support on secure code implementation, design and architecture
Threat-modeling & risk analysis
Participate in providing annual OWASP & PCI training for developers
Helps maintain updated Secure Coding Best Practices
Common application-level vulnerabilities
Controls Evaluation – Review, validate, recommend and create standards
Review of open-source development libraries for security risks
Web application firewall (WAF) rule development and implementation
Security technologies review and recommendations
Bachelors of Computer Science or similar
6 or more years of experience in applying Information Security best practices to Information Technology assets plus 5 or more years of experience with software development
Experience with static and dynamic vulnerability identification using industry leading scanning tools and manual code reviews
Experience with the Top 10 OWASP (Open Web Application Security Project) vulnerabilities (most critical web vulnerabilities) and how to identify and remediate them
Solid understanding of Information Security in general and the specific behaviors that would secure information assets
Ability to translate Information Security policies and procedures into language that a business and/or technical person can understand; and ability to effectively communicate with both non-technical and technical people
Strong problem solving with the ability to methodically and objectively analyze and resolve Information Security challenges
Ability to work well inside and outside the team