Hero Image

AnitaB.org Talent Network

Connecting women in tech with the best professional opportunities!

Application Security Coordinator

Vanguard

Vanguard

Operations
Penn, PA, USA
Posted on Mar 14, 2026

The Threat Modeling Application Security Coordinator orchestrates and facilitates threat modeling activities across application and infrastructure teams. This role serves as the central coordination point for intake, planning, and execution of threat modeling exercises and related security reviews, ensuring a consistent, timely, and high-quality experience. Partnering closely with engineers, architects, product owners, and cybersecurity specialists, the Threat Modeling team helps teams understand their attack surface, analyze potential threats, and prioritize mitigations early in the development lifecycle to strengthen overall security posture. Acting as the central assessment orchestration function, the specialist manages assessment intake, prioritization, scheduling, documentation, execution tracking, and reporting.

The role blends cybersecurity risk management expertise with strong program and project management discipline, leveraging Agile and Scrum‑based practices to meet defined SLAs, quality standards, and reporting expectations. By combining strong cross-functional, stakeholder management, and planning skills, this role enables the threat modeling team to drive a consistent “security‑by‑design” approach across the portfolio.

This Hybrid Role (in office Tues‑Wed‑Thurs) is based in Charlotte, NC, Dallas, TX, or Malvern, PA (HQ).

Responsibilities:

Threat Modeling & Secure Design Coordination

  • Provide programmatic support and coordination for application and infrastructure security assessments.
  • Own and manage the threat modeling engagement from intake through final reporting and closure.
  • Coordinate workshop scheduling across multiple concurrent engagements, balancing priorities, dependencies, and resource availability.
  • Partner with application teams, infrastructure owners, and product stakeholders to gather pre workshop information, technical documentation, architecture diagrams, and required artifacts.
  • Ensure threat modeling workshop scope, assumptions, and prerequisites are clearly defined and validated prior to execution.

Stakeholder Engagement & Partnership

  • Serve as the primary coordination point between cybersecurity, engineering, architecture, and product stakeholders for threat modeling and secure design activities.
  • Build strong relationships with development and infrastructure teams to promote early engagement with security and “shift‑left” practices.
  • Clearly communicate expectations, timelines, and outcomes to both technical and non‑technical audiences.
  • Escalate risks, delays, or blockers to appropriate leaders in a timely, structured manner.

Documentation, Tracking & Reporting

  • Ensure threat modeling sessions and outcomes are accurately documented, including identified threats, assumptions, mitigations, and residual risks.
  • Maintain high‑quality records in designated tools and repositories, ensuring traceability from threats to corresponding controls or backlog items.
  • Support audit‑ready documentation and evidence requirements related to application and infrastructure security design.
  • Produce regular reporting on volume, throughput, cycle times, and themes emerging from threat modeling activities.

Risk & Vulnerability Alignment

  • Coordinate with vulnerability management and risk teams to align threat modeling outcomes with broader risk registers, remediation workflows, and standards.
  • Ensure that critical threats and design weaknesses are properly logged, tracked, and dispositioned through established risk processes.
  • Support remediation follow‑up by partnering with technology owners to monitor progress on agreed mitigations.

Agile Ways of Working & Coordination

  • Apply program and project management best practices to manage complex, multi workstream assessment activities.
  • Maintain assessment roadmaps, intake queues, and execution plans aligned to business and technology priorities.
  • Leverage Agile and Scrum style practices where appropriate, including backlog management, sprint planning, stand ups, retrospectives, and dependency tracking.
  • Act as a servant‑leader / facilitator for security‑focused work, removing impediments and enabling smooth execution across teams.
  • Contribute to the refinement of threat modeling playbooks, templates, and checklists to drive consistency and ease of use.

Qualifications

  • Bachelor’s degree in Information Security, Information Technology, Risk Management, or a related field (or equivalent experience).
  • Experience (typically 5+ years) in application security, cybersecurity, IT risk management, software engineering, or technology program coordination.
  • Demonstrated experience coordinating or facilitating security activities such as threat modeling, security architecture reviews, or application/infrastructure security assessments in large, regulated, or complex environments.
  • Strong understanding of cybersecurity risk concepts (e.g., vulnerability, risk, threat, attack surface, mitigation).
  • Understanding of software development lifecycles (Agile, DevOps, CI/CD).

Preferred Skills

  • Familiarity with structured threat modeling approaches and tools (e.g., STRIDE‑style analysis, attack trees, or similar methodologies).
  • Familiarity with security and risk frameworks such as NIST CSF, NIST 800‑53, ISO 27001, or CIS Controls.
  • Program or project management certifications (PMP, PgMP, PRINCE2) or Agile/Scrum certifications (CSM, SAFe, PMI ACP).
  • Familiarity with vulnerability management, remediation tracking, and risk acceptance processes.
  • Experience supporting metrics, dashboards, and SLA driven operational reporting.