Centene - Jefferson City, MO
posted 4 months ago
The position at Centene involves applying cybersecurity and privacy principles to ensure that the organization's applications and services are implemented in accordance with internal security standards. The role requires recognizing vulnerabilities in security systems through various methods such as vulnerability and compliance scanning. The individual will oversee and perform threat modeling, security code reviews, security assessments, and security hardening reviews throughout the Secure Software Development Life Cycle (SSDLC) process. Additionally, the position entails engineering and developing cloud automation routines to streamline operations and promote understanding and adherence to the SSDLC Policy and Standards. The responsibilities include ensuring the implementation and maintenance of application security standards as per industry best practices. The individual will perform architectural analysis of the current application security architecture to detect critical deficiencies and recommend solutions for improvement. Auditing application security and operational configurations is also a key responsibility. The role involves monitoring and remediating application security incoming alerts and vulnerabilities such as malware, injection attacks, and unauthorized access. The individual will create application security documents, design standard operating procedures, report findings, and track them to closure by collaborating with related parties. Moreover, the position requires automating routine operational tasks related to application security and designing self-service options to align with best-in-class security standards. The individual will implement application security solutions such as authentication, authorization, encryption, logging, and application security testing throughout the SSDLC process. Undertaking initiatives and policies to review and generate recommendations for application security configuration is also part of the role. Other duties may be assigned as necessary, and compliance with all policies and standards is expected.