Engineering-Dallas-Vice President-Application Risk - Design Reviewer at Goldman Sachs
Dallas, TX 75201, USA -
Full Time


Start Date

Immediate

Expiry Date

14 Oct, 25

Salary

0.0

Posted On

16 Jul, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Ajax, Aws, Angularjs, Tomcat, Oral Communication, Perl, Training, Security Controls, Platforms, Rest, Testing Tools, Threat Modeling, Information Security, Nist, Security Tools, Software Development, Authentication, Ips, Mongodb, Web Applications, Cloud Services, Oauth

Industry

Information Technology/IT

Description

WHO WE ARE

Led by the Chief Information Security Officer (CISO), Technology Risk secures Goldman Sachs against hackers and other cyber threats. We are responsible for detecting and preventing attempted cyber intrusions against the firm, helping the firm develop more secure applications and infrastructure, developing software in support of our efforts, measuring cybersecurity risk, and designing and driving implementation of cybersecurity controls. The team has a global presence across the Americas, APAC, India, and EMEA.
Within Technology Risk, Advisory is the consultative and technology subject matter expertise arm, responsible for assessing new technology initiatives for risk, partnering with engineers to architect and design secure products and services, embedding implementation reviews as part of the SDLC and CI/CD pipeline via code analysis and penetration testing, and guiding technology innovation in terms of security and control across Goldman Sachs. The team plays a critical role in designing and assessing controls for our transition to building native public cloud applications.
Goldman Sachs has one of the most progressive Technology Risk teams in the industry and is continuing to push the development of risk in preference to security within technology and the business. Year-on-year success has led the team to work deeper into the organization and gain valuable insights into how technology needs to function, what its risk really is, and how this impacts the business.

BASIC QUALIFICATIONS

  • 5+ years’ experience in one or more technical roles (focusing on application security and cloud security).
  • Prior experience in performing Threat Modeling or Secure Design Reviews or Secure Architecture Reviews.
  • Knowledge of most common Application Security vulnerabilities - e.g., OWASP Top 10 and cloud security gaps.
  • Familiarity with Security standards such as OWASP Testing Guide, OWASP ASVS, NIST, and SANS Top 20.
  • Common security controls and how they apply to different designs and systems, including but not limited to secure authentication, access controls, encryption (at rest/in transit), IDS/IPS, DLP, malware, etc.
  • Experience in application vulnerability assessment and penetration testing of web, thick-client, or mobile applications.
  • Working knowledge of application security tools such as fuzzers, scanners, debuggers, decompilers, proxies, simulators, etc.
  • Familiarity with modern and common web stack technologies (e.g., HTTP, HTML5, AJAX, REST, etc.) and platforms (e.g., DropWizard, Spring Boot, AngularJS, React, Tomcat, .Net, Sybase, MS SQL, MongoDB, etc.).
  • Familiarity with common cloud services, recommended security best practices, and secure deployment patterns. AWS is preferred.
  • Understanding of core cryptography concepts (Encryption, Hashing, HMAC, digital signatures) and how they are applied and attacked in web applications (e.g., TLS attacks, CBC attacks).
  • Ability to analyze protocols (OAuth, SAML, OIDC), flows, and interactions in a system design to evaluate gaps.
  • Ability to identify threats, abuse cases, and gaps in the design before it is implemented.
  • Good written and oral communication to be able to articulate risks to both technical and management stakeholders.

PREFERRED QUALIFICATIONS

  • Experience in crafting custom proof-of-concept application exploits using testing tools/frameworks or scripting exploits in Python, Perl, JavaScript, Shell scripting, etc.
  • Knowledge of network, application, and operating system security risks.
  • MS. in Computer Science, System/Computer Engineering, Cyber-Security, or Information Security.
  • Experience or training in related disciplines, e.g., computer science, computer security, software development, system design, open-source frameworks, encryption schemes, etc.
  • Experience doing architecture review of Mobile applications.
  • Strong experience with AWS security services and best practices (e.g., IAM, Security Groups, KMS, CloudTrail, GuardDuty, Inspector).
  • Experience securing trading and payments platforms, including knowledge of relevant compliance requirements (e.g., PCI DSS).
  • Experience with infrastructure-as-code tools such as Terraform, CloudFormation or AWS CDK.
  • AWS certifications (e.g., AWS Certified Security – Specialty).
Responsibilities
  • Perform software architecture design reviews for on-prem or cloud deployments, with a focus on AWS.
  • Serve as an Application security liaison for the developers and architects in the respective Business Unit.
  • Review security assessment reports from pentest and code review engagements.
  • Conduct Read-out Calls with the business to articulate risk and recommend a mitigation strategy.
  • Develop secure architecture design patterns, particularly for cloud-native applications on AWS.
  • Mentor other junior members of the team
Loading...