What are the responsibilities and job description for the Security Consultant position at The Juno Group, Inc.?
Job Description
We are looking for a highly-skilled Security professional with a good aptitude for Threat Modeling, ability to read through (software) architectural documents and requirements from the different business groups and give accurate and actionable recommendations for the engineers to implement.
The Consultant must have a good understanding of software architecture and development for threat modeling purposes—i dentify designs and implementations which go against best practices and security vulnerabilities, analyze the system and break it down into key components based off logic, and speak to security risks, which may be found in each of those components, and apply sound logic and risk determination in relation to risk acceptance and business operation impact.
Job Title : Security Consultant
Location : Hybrid | San Francisco or Sunnyvale, CA; Seattle, WA; New York, NY
Contract : Long-Term
Only candidates close to or willing to relocate themselves to the specified locations will be considered.
Requirements :
Security Design Review
- In-depth knowledge of secure software development practices and SDLC
- Experience with threat modeling techniques and tools
- Strong understanding of common security frameworks (e.g., OWASP, NIST)
- Proficiency in identifying and mitigating security vulnerabilities in application designs
- Familiarity with regulatory compliance standards (e.g., GDPR, HIPAA, PCI-DSS)
- Ability to analyze complex data flows and identify sensitive data protection needs
- Experience with security architecture, microservice architecture, and design patterns
- Strong communication skills to effectively convey security concepts to technical and non-technical stakeholders
- Hands-on experience with security tools (e.g. static analysis, DAST, SAST)
- Proven ability to collaborate with cross-functional teams, including Developers and DevOps
- Experience with integrating security into CI / CD pipelines
- Knowledge of encryption, authentication, and access control mechanisms
- Familiarity with Cloud security architecture ( AWS, Azure, GCP, OCI)
- Experience in conducting risk assessments and developing mitigation strategies
- Familiarity with automated security testing and continuous monitoring practices
- Ability to document and report security findings clearly and effectively
- Experience with incident response planning and forensic readiness in application design
- Strong problem-solving skills and attention to detail
Threat Modeling
Highly Desired
Highly Desired
Requirements
Web Application Security Security Design Review Threat Modeling OWASP Top 10 Penetration Testing Code Review