Responsibilities
What You’ll Do
Security
- You will have a solid grasp of the product line and technologies used in PlayDigital along with all the security techniques in place (and respective owners)
- Continuously review Infrastructure and Applications for security vulnerabilities and propose remediations
- Identify new threats and coordinate with teams to ensure accurate incident response and mitigation
- Map out infrastructure and software architecture from a security point of view
- Maintain threat diagram + review\propose tools that cover each area
- Search for security gaps by performing risk assessment, penetration testing, and identifying internal risks
- Automating security processes, identifying security threats and vulnerabilities early in development, and integrating security protocols into the CI / CD pipeline
- Assist Infrastructure teams in using the appropriate methods, tools, and techniques to detect and mitigate cyber threats
- Coordinate with the management team to resolve the cyber threats and patch the security system to prevent future attacks
- Hands-on Penetration Testing
- Maintain High Value Targets, Tech Standards and Security Architecture Diagrams
- Experience in incident response procedures and digital forensics a plus
Architect
Understand the architectural concepts and solutions for the products in scopeWork with key business stakeholders, including Product Owners and Technology Leads to understand our processes, data, and domain models in order to contribute to architectural solutions with strong security postureProvide expertise, advice and support on technical matters, from your security scope, for projects during inception and requirements gatheringNice to have
Deep understanding of application and infrastructure deployment constructsExperience with Architectural concepts and distributed systems.Experience with AWS (or other leading Cloud technology )Knowledge of Operating Systems, Networks etc.Cybersecurity Tool Pen Test (+API) + Vulnerability ScanTools ->Information Gathering / Exploitation / Vuln Scanning / Forensics / Web Application Assessment (Kali linux + Burp Suite et al)
Knowledge of Threat IntelligenceUML, ArchiMate or similarly structure modelling techniqueProficiency in programming and scripting languages (e.g. Python + Bash)Knowledge of a subset of these technologies : PHP (Framework Symfony / Laravel / Lumen), RESTful API Design (OAS 3.0), SOAP, Angular, TCP Network packets and network protocols, Linux, Continuous Build / Integration / Delivery tools (i.e dockers, TeamCity, bamboo, Kubernetes), SQL, python, JavaScript, HTML5, C++, Java, NoSQL, Big Data Platforms, Unit / Integration Testing, Jira and Confluence.Keys to Success
Building collaborative relationshipsDecision makingDrive resultsFoster innovationPersonal energySelf-leadershipLI-SB2
Playingforwhatmattersmost
CareersatIGT
WinwithIGT