Work closely with internal product and engineering teams (Software and Hardware) to formulate security strategies that are compatible with the product development and feature rollout schedule.

More Uses of the Sae J3061 Toolkit:

  • Refine your system and software level test cases to ensure compliance with your system and software level security requirements.
  • Establish: root cause and corrective action analysis.
  • Support system integration validation testing, hardware fault injection testing.
  • Supervise: security architecture development.
  • Formulate: security test suite execution and reporting automation.
  • Manage work with team members to develop IATF 16949 and ISO 26262 Supporting Process Procedures, Instructions, and defining meaningful record collection strategies.
  • Audit: Cybersecurity engineering, verification and validation.
  • Analyze tools for and results of secure code analyzers and work with Security leadership and software leads on secure development practices.
  • Lead engineering projects to identify threats and vulnerabilities in your infrastructure, software and system architectures.
  • Perform risk analysis so that appropriate countermeasures can be developed.
  • Ensure you succeed; build up the processes and tooling for automated security code review.
  • Collaborate on advanced engineering projects with outside partners.
  • Manage and specify system with all predominant operating systems.
  • Develop and maintain the ISO 26262 Module 5 Hardware work products defined by the safety standards to prove compliance of the Safety Case.
  • Ensure you challenge; understand of software simulation, validating software functions, and software safety mechanisms.
  • Create a v and v strategy for security requirements.
  • Support security related customer milestones and assessments.
  • Orchestrate: research technologies and security benchmarking data gathering.
  • Manage work with engineering teams from concept through implementation, representing the consideration of security in the design throughout the process.
  • Be accountable for developing and reporting KPIs for test data.
  • Become the expert in configuration management hardware, its firmware, serial number, hardware, etc.
  • Manage work with engineering leadership to ensure that security verification plans are coherent and in sync.
  • Develop threat models and perform thread analysis using industry best practices.


Categories: Articles