Common JD Requirement Checklist
- Core security domain ownership (SOC, IR, IAM, AppSec, cloud security, GRC)
- Threat model and risk assessment depth expected by the role
- Tooling responsibilities and measurable security outcomes
- Security control lifecycle ownership (design, deploy, monitor, improve)
- Collaboration with product and infrastructure teams for secure delivery
- Regulatory or framework mapping expectations (NIST, ISO 27001, CIS)