Sr. Application Security Consultant

For Those Who Work At Home, OH, United States

Apply now Apply later

Location:

For Those Who Work At Home - Various, Ohio 44144

Job Profile Summary

Serves as the senior process owner for DevSecOps processes, tools, and security automation for the Corporate Information Security (CIS) Application Security program. Works closely with cloud security and Policy as Code program lead to ensure applications are built and deployed to conform with configuration baselines. All associated efforts are to promote and advance information security processes and culture, and must reflect compliance with best practices, applicable federal and industry regulations, as well as company information security policies and standards.

Job Description

Required Qualifications:

  • Bachelor degree preferred; equivalent experience of 8 or more years of combined experience within information technology or information security is acceptable
  • Qualified candidate will include 8+ years of broadly based, progressive experience in information systems or information security environments or software engineering
  • Qualified candidate must have experience or be well-versed in development technologies such as Java, Node, or .NET frameworks and have a thorough understanding of web application design and frameworks.
  • Qualified candidate must be able to perform comprehensive static and dynamic application testing following industry-standard testing methodologies and has experience with one or more application review tools such as Snyk, Fortify, Checkmarx, Veracode, Burp Suite, Webinspect, Prisma Cloud, Prisma Compute, CI/CD pipelines, or GitLab security scanners.
  • Ability to lead an enterprise wide information security program and processes related to cloud security and policy as code enforcement
  • Must be able to use command line tools on Mac workstations.
  • Ability to write shell scripts, python scripts, PowerShell scripts, CI/CD pipeline tasks and implement automation workflows using APIs
  • Ability to build and sustain collaborative relationships with multiple constituencies
  • Ability to translate information security terminology into terms understandable to diverse groups
  • Excellent written and oral communication skills
  • Excellent analytical and problem solving skills
  • Excellent facilitation and negotiation skills
  • Ability to work independently
  • Ability to multi-task and manage competing priorities
  • Detail oriented
  • Commitment to teamwork
  • Ability to drive Continuous Improvement efforts

Preferred Skills

  • Background in application security, DevSecOps practices, cloud development, cloud configurations, and cloud security
  • Able to guide application and infrastructure teams on application security remediation
  • Able to manage development projects with work intake, sprints, and planned releases
  • Background in information security and or organizational communication within the financial services industry
  • Understanding of federal and industry regulations associated with information security, such as Sarbanes-Oxley, HIPAA, GLBA, etc.
  • Understanding of application security and cloud security frameworks and standards, such as NIST, CIS, CSA, OWASP, etc.
  • Knowledge of systems architecture such as network and distributed systems, and or mainframe systems
  • Knowledge of security services such as firewalls, IDS, vulnerability assessment, and authentication
  • Professional certification (CISSP, GWEB, OSWA/OSWE, BSCP, or Google Professional Cloud Security Engineer) is desirable

Essential Job Function:

  • Coordinates the development, implementation, and administration of application security policies and standards
  • Coordinates and oversees the work of junior team members in application security
  • Development and other operational tasks to maintain the Application Security testing and DevSecOps program within the CIS Application Security team
  • Coordinates remediation prioritization and triage efforts for the application security program
  • Coordinates the development, implementation, and promotion of effective information security awareness within the organization with the goal of making all employees, contractors, alliances, and other third parties security aware
  • Monitors compliance with the organization's information security policies and standards among employees, contractors, alliances, and other third parties, facilitating remediation by referring problems to appropriate department managers for resolution
  • Promotes the availability, integrity, and confidentiality of company data, regardless of medium
  • Provides direction, guidance, and opinions regarding information security awareness, communication, policies, and standards
  • Assists with the development of information security training to all employees, contractors, alliances, and other third parties, as required.  Ensures sponsored training conforms to existing policies and standards
  • Directs the timely dissemination of information security information
  • Serves as an internal information security consultant and liaison to all areas of the organization as a daily activity
  • Communicate the practical implications of information security decisions, issues and plans to the organization
  • Works with management and the CISO to coordinate policy approval by the Information Security, Continuity, and Privacy Council
  • Coordinates and promotes the utilization of the Corporate Information Security intranet web site as an information delivery and awareness tool
  • Monitors advancements in information security methodologies and technologies
  • Monitors changes in legislation standards that may affect information security
  • Participates in enterprise-wide information security architecture discussions, as required
  • Participate in and partner with professional information security associations, such as Infragard and ISSA
  • Selects and or works with external vendors, outside consultants, and other third parties to improve information security, as required
  • Attends conferences and training as required to maintain proficiency

COMPENSATION AND BENEFITS

This position is eligible to earn a base salary in the range of $115,000.00 to $125,000.00 annually depending on job-related factors such as level of experience. Compensation for this role also includes eligibility for short-term incentive compensation and deferred incentive compensation subject to individual and company performance. Please click here for a list of benefits for which this position is eligible.

Please click here for a list of benefits for which this position is eligible.

Key has implemented a role-based Mobile by Design approach to our employee workspaces, dedicating space to those whose roles require specific workspaces, while providing flexible options for roles which are less dependent on assigned workspaces and can be performed effectively in a mobile environment. As a result, this role may be Mobile or Home-based, which means you may work primarily either at a home office or in a Key facility to perform your job duties.

Job Posting Expiration Date: 02/27/2025

KeyCorp is an Equal Opportunity and Affirmative Action Employer committed to building a diverse, equitable and inclusive culture. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status or other protected category.

 

Qualified individuals with disabilities or disabled veterans who are unable or limited in their ability to apply on this site may request reasonable accommodations by emailing HR_Compliance@keybank.com.


#LI-Remote

Apply now Apply later
Job stats:  0  0  0

Tags: APIs Application security Automation Burp Suite Checkmarx CI/CD CISO CISSP Cloud Compliance DevSecOps Firewalls GitLab GLBA HIPAA IDS Java Mainframe NIST OSWE OWASP PowerShell Privacy Python Veracode

Perks/benefits: Conferences

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.