Syntricate Technologies ยท 1 week ago
Principal Information Security Architect
Wonder how qualified you are to the job?
Information TechnologyProject Management
Insider Connection @Syntricate Technologies
Responsibilities
Perform Threat Analysis & Create/Update the Threat Modelling.
Perform threat analyses for complex technical designs and report the results using standard templates.
Create the initial Threat Modelling or update an existing Threat Modelling.
Track critical and high findings and update changes in the Threat Modelling.
Derive Security Requirements based on application or system descriptions.
Review design documents for security requirements fulfillment, design errors, and known design shortcomings.
Submit a report listing all shortcomings and suggestions for fixing them.
Review implementation for security/design requirements fulfillment, implementation errors, and known implementation shortcomings.
Submit a report listing all shortcomings and suggestions for fixing them.
Review project security planning documents for effort estimates, cost estimates, timeline plausibility, progress, completeness, budget planning, and ordering status of security services.
Submit a report listing shortcomings, suggestions for fixing them, and risks related to achieving project goals.
Responsible for end-to-end cyber security incident management process.
Answer explicit security-related questions, provide expert consulting on various security subjects.
Perform technical security tasks with specific, well-described results.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Perform Threat Analysis & Create/Update the Threat Modelling
Derive Security Requirements based on application or system descriptions
Review Design and Report Issues related to security requirements, design errors, and known design shortcomings
Review Implementation and Report Issues related to security/design requirements, implementation errors, and known implementation shortcomings
Review Project Security Planning and Report Issues related to effort estimates, cost estimates, timeline for security tasks, progress of security, completeness of planned security tasks, security budget planning, ordering status of mandatory security services, and risks to achieving project goals
Responsible for end-to-end cyber security incident management process
Various Expert Consulting on Information Classification, Security aspects of project management, Technical information security, Cryptography, Cloud Security, TPRM, Third-Party Risk Management, Vulnerability Review and Assessment, Dev Sec-ops, Security Tools Audit Support (External and Internal)
Perform complex Technical Security Tasks with specific, well-described results
Company
Syntricate Technologies
Syntricate Technologies offers quality assurance, validation, regulatory, business analysis, and project management services.
Funding
Current Stage
Growth StageCompany data provided by crunchbase