APPLICATION SECURITY ENGINEER SKILLS, EXPERIENCE, AND JOB REQUIREMENTS

Updated: July 29, 2024 - An Application Security Engineer skilled in Information Lifecycle Management (ILM), ensures secure data retrieval and updating via backend APIs. They define consumer security architecture, develop user-friendly experiences, and conduct QA testing in agile environments. Proficient in web and mobile application security risks, Linux, Networking, Cryptography, and software development, they maintain seamless application functionality across CI/CD pipelines.

Summary of Application Security Engineer Knowledge and Qualifications on Resume

1. BS in Computer Science with 5 years of Experience

  • Hands-on experience in enterprise penetration testing with an emphasis on Cloud or systems
  • Successful track record of implementing and delivering projects involving a variety of cybersecurity functions for mobile applications
  • Hands-on experience in Android and iOS programming
  • Deep understanding of inner workings of security concepts and mechanisms
  • Knowledge of security-related topics such as authentication, entitlements, identity management, data protection, 
  • Knowledge data leakage prevention, validation checking, encryption, hashing, principle of least privilege, 
  • Knowledge software attack methodologies, secure data transfer, secure data storage, etc.
  • In-depth knowledge of vulnerabilities and mitigations
  • Reverse Engineering of Objective-C code and Java Byte Code
  • Demonstrated practical knowledge of Android and iOS cryptography

2. BS in Cybersecurity with 2 years of Experience

  • Experience in enterprise software development
  • Demonstrable experience in Application Security
  • Experience with OWASP and tooling such as Burp Suite/Proxy, SonarQube, HP Fortify, etc or similar.
  • Strong experience with modern development languages and frameworks
  • Passion to make security realistic, achievable and interwoven with the business fabric
  • Experience with Threat Modeling in an enterprise, not just theoretical
  • Strong experience with cloud provider ecosystems, ideally Microsoft Azure
  • Strong understanding of web applications and architectures, relational and non-relational databases, and hardware architectures
  • Effectively applying the principles of information security to IT environments
  • Strong understanding of modern application development and operational philosophies
  • Some project management experience: Able to assess needs, define objectives, identify resources needed 

3. BS in Information Technology with 2 years of Experience

  • Non-internship professional experience with web application Architecture Security Review
  • Experience in Threat Modeling, Static Code Review, Penetration Testing, and Incident Response Planning.
  • Proven experience with the information security principles and the Common Body of Knowledge (CBK) domains
  • Experience in core technologies (CIA, encryption, identity, authN/authZ, SSO, web protocols, and privacy).
  • Experience with Amazon Web Services (AWS) products and security controls.
  • Proficient in at least one programming language - Java
  • Ability to communicate security requirements to both technical and non-technical stakeholders.
  • BS in Engineering or Computer Science, or other relevant degree.
  • Experience in advocating security best practices for third party integrations (e.g. with SAAS solutions, third-party libraries, etc.).
  • Current knowledge around web and mobile application vulnerabilities, attacks, and mitigation methods.
  • AWS certifications such as AWS Certified Security – Specialty, AWS Certified Cloud Practitioner, or other security related certifications such as CEH, Security+, or GSEC.

4. BS in Software Engineering with 3 years of Experience

  • .NET or Java Web Application development on an enterprise scale
  • Code review practice, functional and quality focus
  • Technical leadership in design, development and/or support
  • Application/product management experience
  • Software testing, QA or security leadership
  • Utilization of APIs such as RESTful Services
  • Scripting ability in Python or similar language
  • Committed interest to AppSec
  • Vulnerability rating and analysis (CVE, CVSS, CWE ratings) utilization
  • Proficiency with a static analyzer such as Checkmarx, Fortify SCA or Coverity
  • Understanding of application security vulnerabilities and prevention
  • CISSP, GISSP or other relevant secure coding certification(s)

5. BS in Computer Engineering with 6 years of Experience

  • iOS or Android Mobile application development for consumer applications
  • Technical specification development, both internally and for vendor software
  • Threat modeling of application architecture
  • Business experience in and/or supporting the financial sector
  • Security vulnerability assessment techniques during design, development and testing
  • Operation of enterprise policy and standards for technologies and development
  • Engagement of key stakeholders, both technical and senior leadership
  • Experience with public internet web and/or consumer mobile development
  • Experience involved in testing, QA or security related activities (can be concurrent)

6. BS in Mathematics with 7 years of Experience

  • Coding and scripting experience using Java, JavaScript, and/or Python, for example
  • DevOps pipeline experience related to the automation of application testing, delivery, and infrastructure as code (e.g., GitHub, Jenkins, Puppet)
  • Familiarity with various application and code scanning technologies – SAST, DAST, RASP
  • Experience logging, identifying, tracking, and resolving cybersecurity vulnerabilities
  • Strong security aptitude and an ability to learn new technologies quickly
  • Proven analytical, problem solving, and collaboration skills
  • A proven ability to communicate effectively and regularly with internal and external stakeholders relating to incidents, problems, changes, and maintenance
  • Worked closely with security architects to develop service and technology roadmaps
  • Identified and recommended new services and solutions
  • Defined cybersecurity requirements, standards, best practices, and procedures
  • Worked with vendor support to continuously improve product implementations, integrations, and utilization

7. BS in Information Systems with 3 years of Experience

  • Led performance tuning, disaster recovery, and integration of applications with other enterprise tools
  • Familiarity with cybersecurity and risk management frameworks like NIST CSF, ISO 270001, CIS and OWASP
  • Communicated effectively and regularly with internal and external customers relating to incidents, problems, changes, and maintenance
  • Experience troubleshooting complex systems, remediating issues, and taking steps to prevent recurring issues.
  • Achieve objectives and begin implementation towards goal completion
  • Experience in mobile application development (Android and iOS)
  • Experience with application testing tools (eg. SAST, DAST, IAST, etc)
  • Exposure to Agile methodologies (SAFe, Kanban, Scrum)
  • Experience working in the cloud computing industry with a focus of sustaining IT services.
  • Experience on code scan include DAST/SAST/IAST, skill and knowledge about remediation.
  • Automation: RestAPI integration, UCD, Jenkins, Ansible.
  • Development skill with Java or other related language.
  • Interest in Security and compliance.

8. BS in Network Security with 2 years of Experience

  • Work with backend APIs to retrieve and update information securely
  • Professional with security ILM background.
  • Define the architecture for consumer security on various projects
  • Develop secure and consumer user experiences
  • Ensure the applications run properly from front end to back end
  • Work in a pair programming and agile environment
  • Experience in a security or QA testing-focused role
  • Introductory understanding of web application and mobile application security risks
  • Fair understanding of Linux, Networking, and Cryptography fundamentals
  • Experience with software development and code reviews, CI/CD pipelines, Node.js
  • Excellent command of English, both written and verbal

9. BS in Information Security with 5 years of Experience

  • Crafting, implementing and supporting highly scalable backend applications. 
  • Deep understanding of web protocols (TCP, HTTP, GRPC) and API development.
  • Experience with secure SDLC, Threat Modeling and SAST. 
  • Knowledge of development/integration tools and technologies (e.g. CI/CD)
  • Have a background in web application development and code auditing
  • Strong experience with Java and the Java ecosystem, familiarity with Python and Javascript and other scripting languages.
  • Proficiency in networking concepts (firewalls, load balancers, etc)
  • Experience working with infrastructure in public cloud (e.g. AWS, Azure, Google Cloud)
  • Passion for understanding and researching application security, vulnerabilities and exploitation techniques.
  • Ability to triage, recommend remediations and implement fixes as needed.
  • Ability to craft and establish secure coding patterns/standards across multiple code repositories. 

10. BS in Electrical Engineering with 2 years of Experience

  • Experience in security, preferably in application security or software engineering role
  • Technical skills including networking, software engineering, systems administration, penetration testing and vulnerability assessments
  • Experience in a cloud infrastructure environment - AWS or Azure, preferably with Azure PaaS experience
  • Experience in vulnerability management and threat intelligence capabilities
  • Experience in working with software developers to advise on security controls and requirements
  • Experience with common information security management frameworks, standards, principles and processes (OWASP, CIS, SANS, ISO, NIST etc)
  • Relevant security certifications (CISSP, GIAC, Security+, CEH, OSCP etc)
  • Experience in highly automated DevOps environments and familiarity with toolsets including Git, ARM, EBS, CloudFormation, Docker, Kubernetes, Puppet, Chef etc
  • Excellent verbal and written communication skills in English
  • Mentor team members on writing code that is secure, efficient, maintainable and testable.

11. BS in Computer Science with 4 years of Experience

  • Experience with Cyber Security / Application Security Risk Management
  • Previous working experience as a Penetration Testing Expert and vulnerability assessment
  • In-depth understanding of application security frameworks and testing tools such as Aircrack-ng, Burp Suite, SQLmap, NIST and OWASP
  • In-depth knowledge of application development processes and at least one programming or scripting language (e.g., Java, Scala, C#, Ruby, Perl, Python, PowerShell
  • Regulatory Compliance
  • Applicable knowledge of Windows client/server, Unix/Linux systems, Mac OS X, VMware/Xen, and cloud technologies such as AWS, Azure, or Google Cloud
  • Experience with Source Code Review
  • Experience in mobile application, network and wireless penetration testing.
  • Capable of analyzing requirements
  • Develop and peer review of LLD (Initiate/ participate in peer reviews)
  • Participate in discussions with business stakeholders
  • Create test cases as per the different testing methodologies
  • Coach members of project groups to ensure effective knowledge management activity.

12. BS in Cybersecurity with 5 years of Experience

  • Required coding languages: JavaScript, Java, .NET
  • Desired Experience/knowledge/expertise with the following:
  • Static and dynamic code scanning tools and methodologies, such as Fortify, WhiteHat, Burp, SonarQube, etc.
  • Project and software development lifecycles (SDLC, DevOps, DevSecOps, Waterfall, Agile, etc.)
  • Web application communications network architecture, authentication and authorization schemes and protocols, Web APIs, secure authentication mechanisms, secure password storage and exchange, Multi-factor authentications, SSO, Open SSL, Containers
  • Web application development frameworks, protocols, content management systems and techniques: SFTP, JBoss, Apache, IIS, .NET, WordPress, etc.
  • General Database knowledge (Oracle, MS SQL server), SQL
  • Database Architecture, Schema design, OWASP tools and methodologies.
  • Database authentication, authorization methods/protocols
  • DevSecOps experience and expertise.

13. BS in Information Technology with 6 years of Experience

  • Ability to work in a self directed, fast paced environment, that is highly collaborative and cross functional projects that are high profile and critical.
  • Have coding experience in one or more general purpose languages.
  • Able to speak to the identification, exploitation, impact, and remediation of at least one vulnerability class from either the CWE/SANS 25 or OWASP Top 10.
  • Have significant Java, Node/React, or Python experience.
  • Have experience building security through a CI/CD toolchain.
  • Have experience automating with Workflow Orchestration or SOAR tools.
  • Have public CVEs, or contributions to an open source project.
  • Have security consulting experience.
  • Practical knowledge of applied cryptography and common attacks against modern cryptographic algorithms (encryption at rest, TLS, hashing, etc)
  • Keeps up with industry trends in security, technology and threats
  • Know Firewall, Ports, connection, VPC tunneling, AWS data movement services (Snowball), Direct Connect. 
  • Have experience with open source security tools -Nessus, Nexpose, Core Impact, BurpSuite, Cobalt Strike, Metasploit, Meterpreter, Empire, Wireshark, etc.
  • Know Linux, Windows, Cisco, Active Directory.
  • Experience programming and scripting