Application Security Lead Engineer
PPL Corporation
Company Summary Statement As one of the largest investor-owned utility companies in the United States, PPL Corporation (NYSE: PPL), is committed to creating long-term, sustainable value for our 3.5 million customers, our shareowners and the communities we serve. Our high-performing regulated utilities — PPL Electric Utilities, Louisville Gas and Electric, Kentucky Utilities and Rhode Island Energy — provide an outstanding experience for our customers, consistently ranking among the best utilities in the nation. PPL’s companies are also addressing challenges head-on by investing in new infrastructure and technology that is creating a smarter, more reliable and resilient energy grid. We are committed to doing our part to advance a cleaner energy future and drive innovation that enables us to achieve net-zero carbon emissions by 2050 while maintaining energy reliability and affordability for the customers and communities we serve. PPL is a positive force in the cities and towns where we do business, providing support for programs and organizations that empower the success of future generations by helping to build and maintain strong, diverse communities today. Overview The Cybersecurity organization advances the overall state of security at PPL through critical initiatives and coordination of large security and customer-focused projects. The organization builds and procures technologies, tools, and processes to better enable teams at PPL to develop secure platforms and protect data and systems with appropriate security controls. IT Cybersecurity also develops systems to monitor and respond to attacks against our systems, provides educational awareness to the corporation on security best practices, and ensures data sharing relationships with third parties securely protect PPL information. PPL is seeking a highly skilled Application Security Lead Engineer to join our Cybersecurity organization. In this role, you will work closely with our Product Cybersecurity Manager to ensure the security and integrity of our applications and software products. You will provide expert guidance, conduct security assessments, and help shape the security posture of our products. If you are passionate about application security and have a deep understanding of modern software development practices, this position is ideal for you. Responsibilities Conduct security assessments of applications, including vulnerability scanning, penetration testing, and fuzzing. Complete static and dynamic application security testing to identify vulnerabilities and weaknesses Participate in code reviews to identify potential vulnerabilities, weaknesses, defects, etc. Complete Threat Modeling assessments, analyze impact, and develop mitigation strategies. Perform review and testing around Application Programming Interface security Assist relevant parties on identified gaps based on analysis and execute strategies to mitigate/address the risk. Integrate security into the software development pipeline using secure software development lifecycle processes. Create and/or Improve Data Flow Mapping and System Interface Tracking in conjunction with the Product Development and Enterprise Architecture teams. Collaborates with business and technical owners, while engaging relevant SME’s, to establish compliance standards and trackable metrics. Maintain Knowledge and stay up to date on developing security technologies and integrate new technologies into architecture designs, where applicable. All other duties and projects as assigned. Qualifications Education Bachelor’s degree in Computer Science, Information Security, and/or a related field or an equivalent level of work related experience. Experience A minimum of 7+ years of experience in cybersecurity with a focus on software development, secure by design principles, and/or security architecture. Proficiency in conducting security testing, including vulnerability scanning, and static and dynamic code analysis. Expertise in system hardening, including vulnerability assessment, penetration testing, and configuration management. Expertise in designing secure architectures using established frameworks Experience in application security tools and IDE Plug-in environments, including HP Fortify. Experience with securing enterprise web applications and OWASP Top 10, CVSS, CWE, WASC, and SANS-25. Experience in the use of threat modeling tools, and understanding of frameworks such as STRIDE and PASTA. Cloud Technology Expertise: Demonstrate a working knowledge of various enterprise technology stacks used to build applications in the cloud. Your understanding of cloud infrastructure will enable you to assess security aspects unique to cloud-based mobile applications and APIs. Cloud Platform Experience: Possess working knowledge and practical experience in security testing within cloud platforms, particularly Azure. Your familiarity will be crucial for assessing the security of cloud-hosted mobile applications and APIs. Experience in Cloud Native Security practices and technologies including Container security, Serverless security, Kubernetes security and Threat detection. Experience in utilizing Cloud Native Security Tools and Platforms such as Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), and Cloud Access Security Brokers (CASB). Knowledge of federal compliance standards, including NIST 800-53 and NIST CSF. Experience working in Agile teams and have knowledge of Agile principles and practices. Ability to follow outlined processes and procedures with high degree of accuracy. Strong analytical skills to assess risks and vulnerabilities in complex systems. Strong leadership, communication, and interpersonal skills. Collaborative and effective in cross-functional team environments. Preferred Qualifications Professional certifications such as CISSP, CSSLP, or CEH Proficiency in scripting and automation for security testing. Experience with AWS and Google Cloud services Experience utilizing the Scaled Agile Framework (SAFe) Experience in securing Artificial Intelligence, Machine Learning, etc and maintaining integrity of those powered solutions.
Confirm your E-mail: Send Email