FREE ACCESS
5,000–10,000 jobs/day

See all jobs on JobTailor
Search thousands of fresh jobs every day.
Discover
- Fresh listings
- Fast filters
- No subscription required
Create a free account and start exploring right away.
Tech Stack
Tools & technologiesAndroidiOSKotlinObjective-CPythonSwift
About the role
Key responsibilities & impact- Attend design review meetings to identify and document any potential security risks in a new implementation.
- Document any findings and recommendations for formal review.
- Oversee implementation of security-based controls to mitigate any potential risks identified during a security review.
- Advise development team members on security best-practices
Requirements
What you’ll need- Proven experience creating security-based threat models for software applications
- Experience with a Threat Modeling tool such as Irius Risk and STRIDE Threat Modeling methodology
- Proven experience working in a mobile APP environment (iOS and/or Android)
- Experience with using a security-based risk scoring system (CVSS)
- Knowledge of OWASP top ten vulnerabilities for mobile applications and APIs
- A solid understanding of symmetric key and public key cryptography and standard security protocols such as TLS and IPsec.
- Development experience with a common scripting language (e.g., Python, Bash) or programming language (e.g., Swift, Objective C or Kotlin).
Benefits
Comp & perks- A front row seat to life changing CGM technology.
- Learn about our brave #dexcomwarriors community .
- A full and comprehensive benefits program.
- Growth opportunities on a global scale.
- Access to career development through in-house learning programs and/or qualified tuition reimbursement.
- An exciting and innovative, industry-leading organization committed to our employees, customers, and the communities we serve.
ATS Keywords
✓ Tailor your resumeApplicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
security-based threat modelsThreat Modeling toolSTRIDE Threat Modeling methodologymobile APP environmentsecurity-based risk scoring systemCVSSOWASP top ten vulnerabilitiessymmetric key cryptographypublic key cryptographyTLS
Soft Skills
documentationadvisingcommunication
