IoT sensors), Connected Products and the Connected Ecosystem of 3rd party suppliers, dealers, service providers throughout the North America Region.
- Knowledge of the tools and processes for maintaining Application Security; ability to design and implement security programs to prevent data loss and
- Embeds security into the overall approach and vision for data and application development in an organization (Secure Data & Application Strategy).
- Establishes a vision and an enterprise-wide Application Security strategy to drive business value and protect company, client and participant information.
- Reports regularly to senior management, keeping them abreast of the Application Security strategy and best practices, including the threat landscape and the tactical controls and strategic plans to achieve success.
- Identifies, develops, and implements, in partnership with business operations, technology, and client teams, enterprise projects relevant to sensitive and regulated data.
- Evaluates new tools and technologies considered by data platform team, application development teams, and liaison with enterprise information security team to get approvals from them.
- Develops processes, methods, and technologies to facilitate application testing across varying applications that exist in the systems.
- Inspects adherence of applications and its components to Application Security standards and baselines.
- Identifies list of software or applications to be blacklisted or whitelisted to prevent access
- Knowledge of leadership practices and processes; ability to use strategies and skills to enlist others in setting, knowledge of processes involved in
- Mentoring, managing, and motivating a high-performing team of managers and engineering professionals and setting clear priorities to achieve enterprise goals and KPIs.
- Anticipates and manages difficult interpersonal situations and conflicts; resolves them to mutual satisfaction.
- Consults within the team; seeks inputs from subordinates and considers all views while making decisions.
- Monitors employee morale and satisfaction; recognizes employee contributions and achievements.
- Regularly reviews employee performance and provides constructive feedback.
- Works collaboratively with people from diverse backgrounds; understands their needs and perspectives.
- Ensures time, resources, energy, and actions are focused on priorities that matter to the business while reliably meets all team commitments, quotas, and goals.
- Communicates a strong sense of urgency about solving problems and getting work done.
- Makes effective use of resources not under own direct control.
- Takes risks in improving products and services while holding self and others accountable.
- Knowledge of a given technology and various application methods; ability to develop and provide solutions to significant technical challenges.
- Advises others on the assessment and provision of all technical solutions.
- Engages appropriate subject matter resources to effectively resolve technical issues.
- Mentors’ others to enhance their technical competence and its application to achieve more effective technical solutions.
- Coaches’ others in promoting, defining, analyzing, and providing superior technical solutions to business problems.
- Provides effective solutions to moderate technical challenges through strong technical competence, effectively examining implications of events and issues.
- Assumes accountability for personal technical performance and holds others responsible for theirs.
- Knowledge of thinking and reasoning at a conceptual level; ability to identify the critical ideas and interdependencies among system elements that impact
- Interprets the business impact of changes and project data over time.
- Re-frames complex ideas and diverse data into simple pictures or statements.
- Investigates beneath the surface of an issue to focus systematically on root causes.
- Identifies the most significant patterns or data (e.g., "bad data," high-impact data) to focus on.
- Examines the full range of options when considering new ideas or data.
- Validates results through key measures (e.g., customer impact, etc).
- Knowledge of developing cybersecurity policies, standards and procedures; ability to develop and communicate policies, standards and
- Supports creation and amendment of data loss prevention policies and DevSecOps and Secure By Design programs.
- Documents and shares the security best practices within team, conduct security awareness sessions periodically.
- Follows efficient and effective auditing and compliance reporting.
- Provides feedback for improvement of procedures and policies.
- Assists in the development and implementation of specific cybersecurity policies and procedures.
- Participates in the development of organizational cybersecurity policies and standards.
- Generates status reports for senior management to ensure the implementation of cybersecurity standards and policies.