Application Security Architect
Tempe, Maricopa County, Arizona, 85285, USA
Listed on 2026-01-10
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, Systems Analyst
Overview
Application Security Architect Cross Border Talents
• Tempe, AZ, United States
Location:
Tempe, AZ
Employment Status:
Permanent
Department: IT and Computer
Summary of This Role
Responsibilities range from auditing code, architecture and databases used in custom-developed web and cloud applications, to testing for common application level vulnerabilities, weaknesses, and providing both vulnerability analysis and development advise for application hardening. Applicant must possess a strong background in software development, secure coding techniques, secure architecture, software security frameworks, common weaknesses and vulnerability analysis. Candidate should have experience securing web and mobile applications, APIs, micro-services, containers, cloud and cloud-hybrid architectures.
Responsibilities- Working with application development and QA teams across multiple products to:
Review, evaluate and prioritize vulnerability findings - Provide SME support on secure code implementation, design and architecture
- Threat-modeling & risk analysis
- Training
- Participate in providing annual OWASP & PCI training for developers
- Help maintain updated Secure Coding Best Practices
- Common application level vulnerabilities
- Risk Management
- Findings/vulnerability prioritization
- Mitigation strategy
- Controls Evaluation - Review, validate, recommend and create standards
- Review of open-source development libraries for security risks
- Web application firewall (WAF) rule development and implementation
- Security technologies review and recommendations
- Qualifications:
Bachelors of Computer Science or similar – 6 or more years of experience in applying Information Security best practices to Information Technology assets plus 5 or more years of experience with software development - Experience with static and dynamic vulnerability identification using industry leading scanning tools and manual code reviews
- Experience with the Top 10 OWASP vulnerabilities and how to identify and remediate them; solid understanding of Information Security in general and how to secure information assets
- Ability to translate Information Security policies and procedures into language understandable by business or technical audiences; ability to communicate with both non-technical and technical people
- Strong problem solving with the ability to methodically and objectively analyze and resolve Information Security challenges
- Ability to work well inside and outside the team
Note:
At this time, relocation packages, remote work flexibility, and work permits are not offered. All candidates must have their own authorization paperwork.
Interested! Send your updated CV and answers to the following questions:
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).