Director of Software Security Engineering

A company is looking for a Director of Engineering, Software Security and Identity Management. Key Responsibilities: Lead and mentor a high-performing engineering team focused on software security and identity management Develop and maintain a technical roadmap for software security and identity management, ensuring alignment with strategic objectives Oversee the design and implementation of security protocols and identity management solutions to enhance system performance and security Required Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field; Master's degree preferred Relevant certifications such as CISSP, CISM, or CISA are highly desirable 8+ years in software engineering or security engineering, with at least 3 years in a leadership role Proven experience in designing and implementing software security and identity management systems at scale Extensive knowledge of security protocols, encryption, and threat mitigation strategies

Mar 17, 2025 - 20:04
 0
Director of Software Security Engineering
A company is looking for a Director of Engineering, Software Security and Identity Management. Key Responsibilities: Lead and mentor a high-performing engineering team focused on software security and identity management Develop and maintain a technical roadmap for software security and identity management, ensuring alignment with strategic objectives Oversee the design and implementation of security protocols and identity management solutions to enhance system performance and security Required Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field; Master's degree preferred Relevant certifications such as CISSP, CISM, or CISA are highly desirable 8+ years in software engineering or security engineering, with at least 3 years in a leadership role Proven experience in designing and implementing software security and identity management systems at scale Extensive knowledge of security protocols, encryption, and threat mitigation strategies