Project Manager Security Blueprint Automation Apply
Job Description:
Role: Project Manager
Location: Raleigh , Charlotte, Atlanta
Role Summary
As a Project Manager overseeing Security Blueprint Automation, you will be responsible for automating security reviews within the technology delivery lifecycle (TDLC) to ensure security is built into products from the outset. This role demands a well-organized, proactive individual with strong cybersecurity expertise, capable of driving stakeholders to make informed decisions and produce desired outcomes.
As a Project Manager overseeing Security Blueprint Automation, you will be responsible for automating security reviews within the technology delivery lifecycle (TDLC) to ensure security is built into products from the outset. This role demands a well-organized, proactive individual with strong cybersecurity expertise, capable of driving stakeholders to make informed decisions and produce desired outcomes.
Mandatory experience
1. Automated Security Reviews: Implemented automated security reviews within the TDLC, ensuring security controls are consistently applied and enforced throughout the development lifecycle
2. Shift-Left Approach: Incorporated security considerations early in the software development process, ensuring a proactive approach to identifying and mitigating vulnerabilities
1. Automated Security Reviews: Implemented automated security reviews within the TDLC, ensuring security controls are consistently applied and enforced throughout the development lifecycle
2. Shift-Left Approach: Incorporated security considerations early in the software development process, ensuring a proactive approach to identifying and mitigating vulnerabilities
Responsibilities
1. Automatic generation of security control requirements: Generate security controls requirements based on business application descriptions using a questionnaire, fostering a proactive, risk-based approach to security
1. Automatic generation of security control requirements: Generate security controls requirements based on business application descriptions using a questionnaire, fostering a proactive, risk-based approach to security
2. Scope and Stakeholder Management: Effectively manage the scope of the Program and engage with diverse stakeholders, including development teams, security professionals, and business leaders, to ensure alignment and buy-in
3. Performance Monitoring and Reporting: Establish key performance indicators (KPIs) and metrics to track program success, and regularly report progress to senior leadership and stakeholders

