Security Architect- HP Wolf Security

Company: HP
Company: HP
Location: Spring, Texas, United States of America
Commitment: Full time
Posted on: 2023-09-08 06:10
Security Architect- HP Wolf SecurityDescription -The primary focus of the HP Wolf Security team is developing cyber security solutions to protect our customers devices and data. The digital threat landscape is ever-changing and as the cyber security industry reacts and adapts to changes, so too do the malware authors.  Our unique micro-virtualization technology ensures that customers are protected from even the most bleeding edge cyber security threats. That micro-virtualization technology forms a key pillar in a wider cyber security suite that we're actively developing. To see what our engineering teams are working on, check out our technical blogs: https://threatresearch.ext.hp.com/blogJob Description for the Security ArchitectThe Security Architect works with a variety of engineering teams including product development, SQA, product and program management, technical documentation, product compliance, and support throughout the Secure Software development lifecycle (S-SDLC). As an advocate for customer trust, you will drive and contribute to a broad range of security-related activities that improve the security posture of our products and services. You are a key influencer with a passion for information security and will contribute significantly to architecture and application security reviews, and the development of security requirements to improve the security posture of HP products and services.  Responsibilities for the Security Architect:As a technical subject matter expert, you will evangelize application security throughout the product delivery process by working closely with the product and services engineering teams to drive the adoption of internal security, privacy, and relevant compliance initiatives related to the development and delivery of products and services in cloud-based solutions.  Conduct regular security assessments, attack surface analysis, 3rd party security vulnerability assessments, static and dynamic application security testing, and security code reviews across a wide variety of products including cloud-based services and services delivery platforms to verify that security controls have been implemented correctly.  Assist the engineering teams in the interpretation and remediation of results of penetration testing and vulnerability assessments and common software security weaknesses. Contribute to the development of product security policies, standards and guidelines related to product and services security. Understand the threat landscape as it relates to cloud-based solutions and interact directly with enterprise architecture, engineering, and development teams to help them understand, avoid, and mitigate security issues while ensuring alignment with HP standards and policies. Work with engineering, development, and extended teams to implement new security technologies and processes, including the evaluation and recommendation of security controls, mitigation strategies and tools, and risk management best practices. Partner with the extended HP cyber security teams to work on solutions, proof of concepts, and Engagement opportunities that align with cyber security objectives and priorities. Conduct security research to stay abreast of emerging security threats and industry best practices and advise the organization of potential risks and threat mitigation techniques. Requirements for the Security Architect:Proven track record and experience in performing software security assessments including vulnerability assessments with a background in any of the following: Cloud Architecture, Systems Design, Software Development, Infrastructure Architecture, Data Engineering or DevOps Principal level experience in the following areas: software development, cloud computing, systems engineering, and cyber security. Extensive experience with security assessment technologies and analysis tools with a solid understanding of threats, vulnerabilities, risks, defenses, security principles, and potential ways to mitigate those threats. Senior level experience with secure coding techniques, application security testing and security code reviews, authentication, and security protocols. Programming experience in any language. Broad experience related to cloud architectures, applications development practices, networking, security, DevOps, containers, serverless, CI/CD, systems management and monitoring. Ability to communicate security and risk-related concepts to technical and non-technical audiences including executives and business stakeholders with the ability to lead and coordinate discussions. A great Security Architect will have the following-Degree in Computer Science or related field. Working knowledge of cloud-native architectures. Experience with DevOps practices to ensure that security and privacy are considered and integrated into the Secure Software Development Lifecycle. Professional experience architecting/deploying/operating solutions built on cloud-native architectures. Experience with threat modeling and attack vector analysis and mitigations a plus. Experience with the integration of automated security analysis tools within the S-SDLC. About you: You’re out to reimagine and reinvent what’s possible- in your career as well as the world around you. So are we. We love taking on tough challenges, disrupting the status quo, and creating what’s next. We’re in search of talented people who are inspired by big challenges, driven to learn and grow, and dedicated to making a meaningful difference.#LI-Post Our history:Inspired by the isolation principles of traditional virtualization, our team known then as Bromium, created a game-changing technology called micro-virtualization to protect end users against advanced malware. Every task the user performs, such as opening a document or clicking on a link, is isolated in its own micro-VM, with access to just the resources required for that task, and existing just for the life of the task. Protection is thus provided through isolation, without relying on detection, hence reliably defending the user from polymorphic and even zero-day malware. Bromium was acquired by HP Inc on 19 September 2019 forming HP Wolf Security. For more information, visit our website: https://www.hp.com/uk-en/security/endpoint-security-solutions.htmlHP’s commitment to diversity, equity and inclusion – it's just who we are. From the boardroom to factory floor, we create a culture where everyone is respected and where people can be themselves, while being a part of something bigger than themselves. We celebrate the notion that you can belong at HP and bring your authentic self to work each and every day. When you do that, you’re more innovative and that helps grow our bottom line. Come to HP and thrive!!HP is a technology company that operates in more than 170 countries around the world united in creating technology that makes life better for everyone, everywhere. We work to maintain this position while adding new technologies and innovative products to our portfolio. We invent, develop and bring to market new technologies and capabilities as well as integrate these technologies into our systems. Our focus is on printing and imaging technologies as well as pursuing broader alternative technologies and research with an eye toward commercial applications. We are dedicated to providing advanced innovative solutions to our partners and customers. Job -Information TechnologySchedule -Full timeShift -No shift premium (United States of America)Travel -Relocation -EEO Tagline - HP Inc. is EEO F/M/Protected Veteran/ Individual with Disabilities.
View Original Job Posting