Fort Worth, Texas
•
Today
Secure Profiling & Threat Modeling Identify and document application threats using STRIDE, C4 modeling, and MITRE methodologies. Build data flow diagrams and comprehensive threat models for critical applications. Provide actionable security recommendations based on threat modeling outputs. Maintain tracking and coordination of remediation activities resulting from secure profiling engagements. Identity & Access Architecture Design secure authentication and authorization models using: o OAuth 2.0
Easy Apply
Contract, Third Party
Depends on Experience



