Tech Risk - Advisory - Sr. Application Security Architect - Vice President
Business Unit Overview:
Led by the Chief Information Security Officer (CISO), Technology Risk secures Goldman Sachs against hackers and other cyber threats. We are responsible for detecting and preventing attempted cyber intrusions against the firm, helping the firm develop more secure applications and infrastructure, developing software in support of our efforts, measuring cybersecurity risk, and designing and driving implementation of cybersecurity controls. The team has a global presence across the Americas, APAC, India, and EMEA. Within Technology Risk, Advisory is the consultative and technology subject matter expertise arm, responsible for assessing new technology initiatives for risk, partnering with engineers to architect and design secure products and services, embedding implementation reviews as part of the SDLC and CI/CD pipeline via code analysis and penetration testing, and guiding technology innovation in terms of security and control across Goldman Sachs. The team plays a critical role in designing and assessing controls for our transition to building native public cloud applications.
Role:
In this role, you will be reviewing Software Architecture designs and helping identify detrimental architecture flaws earlier in the SDLC. You will be required to leverage your Application Security knowledge to guide developers and architects on how to build secure software on-prem and in the cloud.
RESPONSIBILITIES AND QUALIFICATIONS:
Job Responsibilities:
- Perform software architecture design reviews for on-prem or cloud deployments.
- Serve as an Application security liaison for the developers and architects in the respective Business Unit.
- Review security assessment reports from pentest and code review engagements.
- Conduct Read out Calls with the business to articulate risk and recommend a mitigation strategy.
- Develop secure architecture design patterns.
- Mentor other junior members of the team.
Basic Qualifications:
- 5+ years' experience in one or more technical roles (focusing on application security).
- Prior experience in performing Threat Modelling or Secure Design Reviews.
- Knowledge of the most common Application Security vulnerabilities - e.g., OWASP Top 10 and cloud security gaps.
- Familiarity with Security standards such as OWASP Testing Guide, OWASP ASVS, NIST, and Sans top 20.
- Common security controls and how they apply to different designs and systems including but not limited to secure authentication, access controls, encryption (at rest/in transit), IDS/IPS, DLP, malware, etc.
- Experience in application vulnerability assessment and penetration testing of web, thick-client, or mobile applications.
- Working knowledge of application security tools such as fuzzers, scanners, debuggers, decompilers, proxies, simulators, etc.
- Familiarity with modern and common web stack technologies (e.g., HTTP, HTML5, AJAX, REST, etc.) and platforms (e.g., DropWizard, Springboot, AngularJS, React, Tomcat, .Net, Sybase, MS SQL, MongoDB, etc.).
- Familiarity with common cloud services, recommended security best practices, and secure deployment patterns. AWS is preferred.
- Understanding of core cryptography concepts (Encryption, Hashing, HMAC, digital signatures) and how they are applied and attacked in web applications (e.g., TLS attacks, CBC attacks).
- Ability to analyze protocols (OAuth, SAML, OIDC), flows, and interactions in a system design to evaluate gaps.
- Ability to identify threats, abuse cases, and gaps in the design before it is implemented.
- Good written and oral communication to be able to articulate risks to both technical and management stakeholders.
Preferred qualifications:
- Experience in crafting custom proof of concept application exploits using testing tools/frameworks or scripting exploits in Python, Perl, JavaScript, Shell scripting, etc.
- Knowledge of network, application, and operating system security risks.
- MS in Computer Science, System/Computer Engineering, Cyber-Security, or Information Security.
- Experience or training in related disciplines e.g., computer science, computer security, software development, system design, open-source frameworks, encryption schemes, etc.
- Experience doing architecture review of Mobile applications.
#J-18808-Ljbffr