Appllication Security/Vulnerability Management Infosys Limited

  • company name Infosys Limited
  • working location Office Location
  • job type Full Time

Experience: 5 - 5 years required

Pay:

Salary Information not included

Type: Full Time

Location: Karnataka

Skills: Java, C, Python, Ruby, net, HTML, JS

About Infosys Limited

Job Description

Key Responsibilities: Architect Design and Review Application Security Architecture in distributed web applications thick clients mobile and cloud platforms Perform Attack Surface Analysis Threat Modeling using STRIDE PASTA and Arrive at Threats Risks Vulnerabilities and propose re mediatory compensatory controls Experience in tools like Threat Modeler Microsoft Threat Modeling tool Threat Dragon and similar tools Application Security Threat Assessment with without tools and Recommendation Work with Development Architecture team ensuring secure design principles Lead development team during design and build phase Exposure to Application Security threat models Programming Skills Java C Python Ruby Net HTML JS In depth understanding of Software development technologies and CI CD pipelines Technical Requirements: Architect Design and Review Application Security Architecture in distributed web applications thick clients mobile and cloud platforms Perform Attack Surface Analysis Threat Modeling using STRIDE PASTA and Arrive at Threats Risks Vulnerabilities and propose re mediatory compensatory controls Experience in tools like Threat Modeler Microsoft Threat Modeling tool Threat Dragon and similar tools Application Security Threat Assessment with without tools and Recommendation Work with Development Architecture team ensuring secure design principles Lead development team during design and build phase Exposure to Application Security threat models Programming Skills Java C Python Ruby Net HTML JS In depth understanding of Software development technologies and CI CD pipelines Preferred Skills: Technology->Application Security->Application Security - ALL,Technology->Application Security->Vulnerability Management,Technology->Application Security->DevSecOps,