Roles: Responsible for identifying, analyzing, and documenting potential threats and vulnerabilities in software/application, systems, networks (on premises or cloud) or cloud services . Responsibilities: 1. Conduct Threat Modeling Assessments: Identify potential threats and risks to the organization's assets, including data, systems, and networks. 2. Collaborate with Stakeholders: Work closely with developers, architects, security teams, and business stakeholders to understand system designs, functionality, and potential vulnerabilities. 3. Perform Risk Analysis: Evaluate the impact and likelihood of identified threats and vulnerabilities to prioritize mitigation efforts.
<< Go Back