You will work across multiple parallel project releases and work items and will have a strong desire to actively champion product cybersecurity best practices. The ideal candidate will take ownership of issues and work on own initiative, driving work items to successful completion. You will have good time-management and organizational skills and be a continual learner, aware of the ever-changing nature of cybersecurity and keen to stay on top of the latest developments.
Ability to work in the Belfast office three days per week
Authorisation to work in Ireland
Basic familiarity with, and keen interest in, formal cybersecurity controls and best practices. E.g., OWASP Top 10, NIST 800-53.
Ability to liaise and negotiate amongst multiple product stakeholders, including:
Engineering management, architects, and lead engineers
Product Security Incident Response Team (PSIRT)
Global Cybersecurity architects
Product Management
Supplier Assessment Team
Site Reliability Engineering (SRE)
Legal (Software Copyright / Licensing Compliance, Trade Compliance)
Individual software and hardware engineers
Previous development experience, including familiarity with authentication, authorization, and SDKs and local and remote APIs.
Basic networking experience and understanding
Understanding of, including ability to reason about and explain common cybersecurity vulnerabilities. E.g., can (to some extent) compare and contrast SOME of:
Authentication vs. authorization
Vulnerability vs. weakness
Hashes vs. ciphers
SQL injection vs. OS injection
RNG vs. PRNG vs. cryptographic RNG
High entropy passwords vs. low entropy
HSM vs. TEE
TLS v3 vs. SSL v3
Stack overflow, buffer overflow, and integer overflow / wraparound.
Certificate vs. key
Signature vs. hash
Basic understanding of software release pipelines: e.g., VCS, branching/tagging, GitOps, software signing, versioning, CI/CD.
Cybersecurity qualifications, such as Security+, CCSP, CISSP, CEH, etc.
Familiarity with Common Vulnerability Enumerations (CVE’s), Common Weakness Enumerations (CWE’s).
Familiarity with multiple operating systems, including Windows and Linux
Degree (or equivalent experience) in a STEM subject, particularly cybersecurity, computer science, software engineering, or electronic engineering.
Basic understanding of software architecture diagrams, attack vectors, and threat modelling, including an ability to create threat models and reason about attack vectors involving multiple vulnerabilities.
Basic understanding of asymmetric vs. symmetric cryptography
A skilled communicator, able to liaise with multiple levels of engineering and management staff
A reasonable degree of previous project / ticket management experience. E.g., SCRUM management, sprint reviews, etc.