+91-8800955639, +91-8368840052, +91-8800956562
IAF iso ec-council certification
+91-8800955639, +91-8368840052, +91-8800956562

Need Help? call us free

ec-council certification

Application Development Security Analyst

Application Development Security Analyst


5 - 10 years
Not Disclosed by Recruiter

Job description:
So what does a Application Development Security Analyst really do? Think of yourself as someone who will do the application of design reviews, security testing, critical code reviews, remediation and mitigation of audit findings in adherence to standards and safe practices, so not just anyone is qualified for this role! We make sure we get the best of the best, after all, we are a ridiculously good company so we make sure our employees are top notch. So come on, now we need your full concentration because it's time to imagine what it's like being an Application Development Security Analyst.

Imagine yourself going to work with one thing on your mind: you will work in support of the Information Security, Applications Development team, and business units In threat modeling on new and existing products and features to help guide security activities, suggesting preferred implementation patterns and identifying areas of security risk for scrutiny. As you tackle your new tasks for the day, you know that it will lead to one thing your department believes in: that you will review implementation code and perform tests on critical products and features; identify security flaws and suggest remediations based from OWASP and other secure SDLC standards and frameworks.

As an Application Development Security Analyst , you will help architect solutions that are inherently secure (Designing, Threat Modeling, Prototyping). You will correctly balance security risk and product advancement. You will provide engineering designs for new software solutions to help mitigate security vulnerabilities. You will implement, test and operate advanced software security techniques in compliance with technical reference architecture. You will perform ongoing security testing, technical assessments and code review to improve software security. You will conduct research on emerging practices, services, protocols, and standards in support of system security and compliance enhancement and development efforts. You will assist the development and maintenance of security operations procedures and processes, as well as work with the business units outside of InfoSec to formally document policies and procedures. You will recommend and support deployment of additional security products and tools, or enhancements to existing tools, to mitigate security risk and detect/remediate compromises. You will work with security engineers for the optimal configuration of network and host-based security platforms in line with compliance and product requirements. You will provide incident response support as needed in response to information security related events. In the event of security incident response, participate in the analysis, troubleshooting, and investigation of security-related, information systems anomalies based on security platform reporting, network traffic, log files, host-based and automated security alerts. You will evaluate systems using vulnerability scanners and manual techniques to verify system security settings and configurations. You will perform other duties as assigned.

So, do you have what it takes to become an Application Development Security Analyst ?

• We need someone who has at least a bachelor's degree in MIS/Computer Science or Business and/or a combination of education and relevant experience.
• Someone with 5+ years of demonstrated application security experience. Someone with detailed technical knowledge of techniques, standards and state-of-the art capabilities for authentication and authorization, applied cryptography, security vulnerabilities and remediation.
• Strong demonstrated knowledge of web protocols and an in-depth knowledge of Linux/Unix/Windows tools and architecture.
• Someone who demonstrated software development proficiency and comprehension of algorithms and processes for programmatic automation via scripting or programming languages (Python, Ruby, shell, perl, etc.).
• Someone with a well-rounded background in host, network and application security
• Someone who has an understanding of the system hardening processes, tools, guidelines and benchmarks.
• Pref any of the Certifications: CISA, CEH or CASE.

Role : System Security
Industry Type : BPO, Call Centre, ITeS
Functional Area : IT Software - Network Administration, Security
Employment Type : Full Time, Permanent
Role Category : Admin/Maintenance/Security/Datawarehousing

UG : Any Graduate in Any Specialization
PG : Any Postgraduate in Any Specialization
Doctorate : Any Doctorate in Any Specialization, Doctorate Not Required

Key Skills scripting , owasp , devops , ceh , certified ethical hacker , cisa , web application security

About Company
Ridiculously Good Outsourcing In 2014, TaskUs made its way to the "Inc 500 | 5000," a prestigious list of the fastest-growing private companies. This is the second consecutive year that TaskUs made it to the list which ranks firms based on revenue growth. "Inc" is the hallmark of entrepreneurial success and the place where future household names first make their mark. TaskUs, Inc. has in its catalog 70 Silicon Valley enterprises. These are newcomers wanting to get a slice from the ever-expanding dotcom -- and tech giants who are already bywords in the app and web industry. These companies entrust TaskUs to do an integral part of their businesses for them -- customer care. However, TaskUs isn't just about that. TaskUs makes sure it stays competitive in the world of zealous offshore outsourcers. TaskUs has been quickly gaining ground and innovative tech firms ask us for an equally innovative service. "Ridiculously good sourcing" is marked indelibly to our ventures to inculcate the company's atypical approach, ardent customer service, and keen attention to details. Our clients -- busy with day-to-day management and market expansions -- can concentrate more on innovations, brand enhancement, and marketing when they leave the vital back-office support to TaskUs with our "true customer experience" service. TaskUs's fleet of manpower are young dedicated employees grouped into teams who provide customer support, content management, photo-editing, data entry, and product description generation for dotcoms. Though TaskUs offers competitive remuneration packages for its workforce, it has already proven that employees are driven not by monetary benefits but by deeply-integrating them into the company -- through employee engagements -- participative and unconventional activities creating our unique culture. TaskUs wants its employees to be the core component of the company -- stakeholders fueled to always perform better. TaskUs's growth is being propelled by these phenomenal teams who deliver outsourced customer care and back-office support to clients like no other company. Many organizations who need services, want to save money, and create efficiency go for outsourcing. Some who want ingenuity and innovation join a historic movement -- TaskUs. Together, let us change the way the world works.

Company Info
Contact Person Seema