About the role :
As a member of Ethos Trust and Safety team, you'll be responsible for building various security services and performing technical security risk assessments to support the Ethos main product.
You'll help architect and build our internal security standards and frameworks.
This role will help build and deploy various security controls in line with foundational security principles like least privilege, defence in depth, segregation of duties and zero-trust architecture.
Duties and Responsibilities :
- Design, develop, and deploy security mechanisms to protect against adversarial attacks, data breaches, and other security Design and build robust threat detection, monitoring, investigation workflows response architectures and the components of the security analytics platform.
- Monitor and evaluate operational / security alerts.
- Conduct Threat Modeling, Design Reviews and Security Testing.
- Communicate risks to engineering staff through training and technical demonstration of vulnerabilities and secure design patterns.
- Partner with the DevOps team to orchestrate / automate security controls in the Ethos Lead the vulnerability management lifecycle at the infrastructure, platform, and application levels.
- Participate in investigations, threat hunting, and incident response activities; build playbooks for specific incident response scenarios.
- Assist with compliance activities, such as SOC2 control implementation and testing, vendor risk assessments, etc.
Qualifications and Skills :
10+ years of full time core, relevant InfoSec experience.Intimate familiarity with AWS cloud security, experience automating security processes in cloud environments.Proficiency in threat modelling, design reviews and security testing of various types of applications, technologies and platforms.Hands-on experience with CI / CD and DevOps tools.Ability to write automation scripts, ideally in more than one language.Experience in vulnerability / threat management activities at the infrastructure, platform, and application level.Experience with penetration tests / red team exercises, ideally the type that involve manual verification, exploitation, lateral movement, etc.Expertise with event management / SIEM solutions, data modelling associated with building event detection and alerting capabilities.(ref : hirist.tech)