Posted:
11/7/2024, 4:00:00 PM
Location(s):
Northern Ireland, United Kingdom ⋅ Belfast, Northern Ireland, United Kingdom
Experience Level(s):
Senior
Field(s):
IT & Security
Workplace Type:
Remote
What you will do
Liaising with the Hardware/Firmware and Software engineering teams to schedule code reviews/scans as per guidelines outlined by JCI cyber Security Board.
Working with Senior Cyber architect to run and discuss results of scans, assess where the risks lie, how best to mitigate
Working with the development team to address cyber risks
Being the gatekeeper and working with the development team and our customers ensuring that all products and solutions released to the market adhere to the latest security standards.
How you will do it
You will work across multiple parallel project releases and work items and will have a strong desire to actively champion product cybersecurity best practices. The ideal candidate will take ownership of issues and work on own initiative, driving work items to successful completion. You will have good time-management and organizational skills and be a continual learner, aware of the ever-changing nature of cybersecurity and keen to stay on top of the latest developments.
What we look for
Basic familiarity with, and keen interest in, formal cybersecurity controls and best practices. E.g., OWASP Top 10, NIST 800-53.
Ability to liaise and negotiate amongst multiple product stakeholders, including:
Engineering management, architects, and lead engineers
Product Security Incident Response Team (PSIRT)
Global Cybersecurity architects
Product Management
Supplier Assessment Team
Site Reliability Engineering (SRE)
Legal (Software Copyright / Licensing Compliance, Trade Compliance)
Individual software and hardware engineers
Previous development experience, including familiarity with authentication, authorization, and SDKs and local and remote APIs.
Basic networking experience and understanding
Understanding of, including ability to reason about and explain common cybersecurity vulnerabilities. E.g., can (to some extent) compare and contrast SOME of:
Authentication vs. authorization
Vulnerability vs. weakness
Hashes vs. ciphers
SQL injection vs. OS injection
RNG vs. PRNG vs. cryptographic RNG
High entropy passwords vs. low entropy
HSM vs. TEE
TLS v3 vs. SSL v3
Stack overflow, buffer overflow, and integer overflow / wraparound.
Certificate vs. key
Signature vs. hash
Desirable:
Basic understanding of software release pipelines: e.g., VCS, branching/tagging, GitOps, software signing, versioning, CI/CD.
Cybersecurity qualifications, such as Security+, CCSP, CISSP, CEH, etc.
Familiarity with Common Vulnerability Enumerations (CVE’s), Common Weakness Enumerations (CWE’s).
Familiarity with multiple operating systems, including Windows and Linux
Degree (or equivalent experience) in a STEM subject, particularly cybersecurity, computer science, software engineering, or electronic engineering.
Basic understanding of software architecture diagrams, attack vectors, and threat modelling, including an ability to create threat models and reason about attack vectors involving multiple vulnerabilities.
Basic understanding of asymmetric vs. symmetric cryptography
A skilled communicator, able to liaise with multiple levels of engineering and management staff
A reasonable degree of previous project / ticket management experience. E.g., SCRUM management, sprint reviews, etc.
#LI-Hybrid
#GOSIA
Website: https://johnsoncontrols.com/
Headquarter Location: Cork, Cork, Ireland
Employee Count: 10001+
Year Founded: 1885
IPO Status: Public
Industries: Industrial Engineering ⋅ Physical Security