Hi,

Hope your are doing good.


Please share me profiles  to md.kh...@3sbc.com <chandra....@3sbc.com>


*Role – Cyber Security Engineer*

*Location: **Burlington, MA*

*6+ Months*



*Mandatory skills*:

*Position Summary:*


*Software Engineer- Cybersecurity* to join our team. In this technical
role, you
will be a critical contributor in the development and deployment
of software solutions to support our development programs and building
compelling products within Abbott’s HF Division.  Under the guidance and
direction of an experienced engineer, you will perform cybersecurity work
within our R&D division by improving software, testing, tools, and
processes and preventing security threats to medical products and
systems. Additionally, you will participate in all phases of the software
lifecycle, including concept development, requirements, design,
implementation, and testing.



*Primary Responsibilities:*


·  Optimize product/system security by creating and reviewing software
architecture and detailed design solutions that reflect best practices.

·  Identify and implement software improvements needed to effectively
protect against and respond to known and emerging cybersecurity threats.

·  Perform or support security testing such as penetration tests, fuzz
testing, and internal/external audits.  Coordinate remediation as
necessary.

·  Work with Software Development, Systems Engineering, Product Security,
and other stakeholders to develop cybersecurity controls.

·  As a team member, contribute significantly to completion of various
project activities, from definition, identifying software functional
requirements, implementation, code reviews, and final release according to
medical device development processes

*Required Qualifications: *

·  Bachelor’s Degree in Engineering (Computer, Electrical, Computer
Systems, Systems, or Software), Computer Science, or related discipline

·  1-3 years of cybersecurity engineering, software engineering design and
development, or systems administration experience

·  Experience in assessing and remediating cybersecurity vulnerabilities

·  Demonstrated knowledge and experience working with Java, Microservices,
C++, Python, Perl, or Shell

·  Experience with OpenSSL, TLS mutual authentication, digital signatures,
certificate management

·  Previous experience working in a regulated industry such as automotive,
aerospace, healthcare, or defense

·  Excellent verbal and written communication skills, with ability to
communicate to all levels of the organization

·  Work with Client Security team to understand policies and processes
associated with on premise services.  Clear understanding of expectations
based on hosting location.

·  Work with CLIENT Security team to identify and understand policies and
processes with solutions cloud hosted.  Clear understanding of expectations
based on hosting location.

·  Evaluate current on prev/existing architecture to determine alignment
and gaps based on identified policies provided by CLIENT Security team
which should align to security, regulatory, compliance, etc…

·  Understand core security services offered by internal service providers
based on hosting models and defined policies.

·  Identify requirements for cloud hosted solutions regardless of
implementation method based on industry based best practices.  Should be
based of threat models and risk based approach.

·  Review base architecture and services offered as part of the default
cloud footprint provided by corporate services.

·  What capabilities from incident and security incident response process
does Client have today?  How can that be leveraged in cloud scenarios?

·  Work with infrastructure to understand what technology services are
applied to on prem and cloud solutions as part of the Corporate IT services.


·  Establish or refine security incident management process.  Should
consist of a “playbook” with defined plays based on exploit.  If available,
should utilize established process and modify based on solution and
scenarios.

·  Review the current SDLC process specifically around security (static and
dynamic) scanning to ensure alignment with best practices.  Recommendations
on go forward changes to process.

·  Identify identity requirements while working with Systems Team given the
proposed solution and assumed localization requirements.  Should include
but not limited to Data sovereignty requirements,

·  Provisioning and de-provisioning requirements, Self service capabilities
and requirement around association.

·  Metadata requirements for identity types

·  Review current vulnerability and penetration test capabilities and
processes and make recommendations on changes to support cloud hosted
solutions in alignment with identified best practices.



*Preferred Qualifications:*



·  Master’s Degree in Engineering (Computer, Electrical, Computer Systems,
or Software), Computer Science, or related discipline

·  Experience in Linux system administration on RHEL or similar
distributions

·  Well versed in FDA Cybersecurity Guidance, GDPR, and NIST

·  Familiar with DISA STIG assessment and implementation for Linux and/or
Windows systems

·  Knowledge of secure programming practices

·  Experience in threat modeling, cybersecurity risk assessment, or
Off The Shelf
Software (OTS) assessment

·  Cybersecurity certification such as CISSP, CSSLP, or similar

·        Knowledge of 62304 and other standards applicable to Class II and
Class III medical devices



Regards,

*Md.Khazababu*

Recruiter

3*S* Business Corporation Inc(*3SBC*)

P: 281-823-9222 Ext 518 | F: 281-823-9225

Email: md.kh...@3sbc.com| <meena.bhu...@3sbc.com%7C> www.3sbc.com

Hangouts – khaza3...@gmail.com <meena.bhusara3...@gmail.com%7C%20Skype>



*3S Business Corporation Inc.  11271 Richmond Ave,  Suite # H107, # H108
Houston, Texas. 77082*

-- 
Are you =EXP(E:RT) or =NOT(EXP(E:RT)) in Excel? And do you wanna be? It’s 
=TIME(2,DO:IT,N:OW) ! Join official Facebook page of this forum @ 
https://www.facebook.com/discussexcel

FORUM RULES

1) Use concise, accurate thread titles. Poor thread titles, like Please Help, 
Urgent, Need Help, Formula Problem, Code Problem, and Need Advice will not get 
quick attention or may not be answered.
2) Don't post a question in the thread of another member.
3) Don't post questions regarding breaking or bypassing any security measure.
4) Acknowledge the responses you receive, good or bad.
5) Jobs posting is not allowed.
6) Sharing copyrighted material and their links is not allowed.

NOTE  : Don't ever post confidential data in a workbook. Forum owners and 
members are not responsible for any loss.
--- 
You received this message because you are subscribed to the Google Groups "MS 
EXCEL AND VBA MACROS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to excel-macros+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/excel-macros/CAKPjPOQgmtRKH_j5GgrZY6L8Vm-%3DtBSsGKxhoudGH5caWJgx0w%40mail.gmail.com.

Reply via email to