Cyber Securityother related Employment listings - Westford, MA at Geebo

Cyber Security

Position:
Cyber Security Location:
Westford, MA Duration:
Contract Employment:
TP Rate:
$Negotiable Job Description ESSENTIAL
Experience:
LEAD CYBERSECURITY SOFTWARE ENGINEER The Cybersecurity Lead will serve as the primary subject matter expert for cybersecurity of Windows and Linux based medical devices.
The successful candidate will bring a culture of security to the software development team including defining requirements, driving the adoption of new tools and processes to solidify security by design and perform security code reviews.
Additional responsibilities include contributing to cybersecurity risk assessments, leading the activities defined in cybersecurity maintenance plans and work instructions, improving the security of the existing code bases and implementing new security related features as needed EDUCATION / EXPERIENCE / SKILLS Bachelors degree in Electrical Engineering, Computer Science or related field 6
years experience in medical device software development projects through full lifecycle from design to deployment Thorough understanding of FDA Guidance documents related to medical device software development and cybersecurity Experience developing cybersecurity risk assessments and maintenance plans Experience with Windows and Linux based embedded systems including use of static analysis and fuzz testing tools Excellent C+
and object oriented programming skills Excellent written and verbal communication skills Demonstrates a proactive approach to getting things done MEDICAL DEVICE INDUSTRY EXPERIENCE IS REQUIRED.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.