Demo

Applications Security Engineer

TEKsystems
TEKsystems Salary
Tempe, AZ Full Time
POSTED ON 1/23/2025
AVAILABLE BEFORE 4/15/2025

Job Description

Job Description

Top Skills' Details

1. 5 years experience in Application security scanning and testing

2. Previous full stack Java experience as well as CI / CD, Dev ops

3. Hands on experience with Qualys

Job Description

The IT Security Threat Analyst independently develops, maintains, and implements comprehensive information security monitoring programs including defining security policies, processes and standards for large and complex environments. Perform comprehensive threat analysis and recommends appropriate course of action, mitigation, and remediation. Provide consultative guidance on the development of information security strategies and programs through demonstrated expertise and knowledge of industry trends and changes with respect to advanced and sophisticated cyberattacks and threats. Lead efforts, oversee work results, provide formal training and serve as a technical resource for Information Security team members. They are the single point of contact and coordination for third-party incident response teams and law enforcement agencies if the environment is breached.

Essential Functions - The essential functions listed represent the major duties of this role, additional duties may be assigned.

  • Subject matter expert in the detection and identification of web application cyberattack signatures, tactics, techniques and procedures associated with advanced threats
  • Independently and proactively prepares detailed technical papers, presentations, recommendations, and findings for Management and other Technology Leaders
  • Develops and maintains documentation for security evaluation procedures
  • Serve as a subject matter expert for team members, specializing in web application security monitoring and application analysis
  • Creates and leads initiatives to improve web application security evaluation processes
  • Leads improvements discussions with third-party vendor regarding security evaluations
  • Proactively identifies company-wide program opportunities and works to implement solutions. Guides the direction of the overall information security monitoring and application security program

Required Work Experience :

5 years related work experience within IT Security

Experience utilizing multiple web application scanning tools.

Experience recommending web application security analysis tools.

Experience working in Agile methodology environment.

Experience working with REST services (prefer also SOAP experience).

Experience with scripting (prefer also some application code development experience).

Required Education :

Related Bachelor’s degree or additional related equivalent work experience IT related field

Additional Required Qualifications :

Strong technical knowledge of security architecture, tools and controls with specific demonstrated experience in web application security evaluation.

Experience working and managing vendor performance and service level agreements

Proven leadership abilities including effective knowledge sharing, conflict resolution, facilitation of open discussions, fairness and displaying appropriate levels of assertiveness.

Proven ability to work under stress in emergencies with flexibility to handle multiple high-pressure situations simultaneously.

Ability to communicate highly complex technical information clearly and articulately for all levels and audiences.

Ability to manage tasks independently and take ownership of responsibilities

Ability to learn from mistakes and apply constructive feedback to improve performance

Strong customer focus with ability to manage customer expectations and experience and build long-term relationships.

Strong team-oriented interpersonal skills with the ability to interface with a broad range of people and roles including vendors and IT-business personnel.

Ability to adapt to a rapidly changing environment and quickly identify new trends and industry changes specific to security and advanced cyberattacks

Top Skills' Details

1. Background as a full stack Java developer with scripting experience like Bash or Python

2. Experience with security testing (SAST, DAST, RASP etc.)

3. Understanding of OWASP Top 10, software security, secure coding, vulnerability management.

4. Knowledge of Cloud Infrastructure and Dev Ops methodologies : Containers (Docker), Kubernetes, micro-services

Secondary Skills - Nice to Haves

Job Description

The Application Vulnerability Management team is responsible for discovering technical vulnerabilities within in-house developed applications. This includes the actual code developed by analysts, dependencies such as open source libraries and container technology. The team analyzes in-house developed applications for known vulnerabilities (e.g., CVE-based vulnerabilities, CWE-based vulnerabilities and OWASP Top 10 vulnerabilities, pripritizes them, and works with the appropriate asset owner to determine if remediation, mitigation or risk acceptance is required and complies with appropriate timelines. Vulnerability tracking and metrics reporting is also part of the teams output.

Responsibilities

  • Discover technical vulnerabilities in Production in code, dependencies and container technology.
  • Support the development lifecycle of in-house developed applications to allow development teams to identify vulnerabilities during the build lifecycle
  • Develop and use scoring models to score vulnerabilities.
  • Provide regular statuses on current work
  • Be willing to take on special assignments that may require additional learning
  • Skills and Knowledge - Web application attacks and trends - Basic operational knowledge of : HTTP / S, XML, HTML, JavaScript, AJAX (Web 2.0) - Web Infrastructure Security (e.g., NGINX, Tomcat, IIS, etc.) - Authentication and Session management - Exploits (e.g., CSRF, XSS, HTTP Response Splitting, Injection attacks, XML External Entities, etc.) - Remediation (e.g., Escaping, Encoding, Input / Output Validation, Parameterized Queries, etc.) - Mitigation (e.g., WAF, IPS, XML Gateway / Firewall, etc.) - Scripting / automation skills (e.g., Python, JavaScript, Powershell, etc.)

    Additional Skills & Qualifications

  • Excellent documentation skills to accurately complete reports and documentation
  • Strong verbal and written communication skills
  • Team player, self starter, able to get up to speed to contribute quickly
  • If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
    Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

    What is the career path for a Applications Security Engineer?

    Sign up to receive alerts about other jobs on the Applications Security Engineer career path by checking the boxes next to the positions that interest you.
    Income Estimation: 
    $88,984 - $115,784
    Income Estimation: 
    $111,369 - $141,168
    Income Estimation: 
    $117,871 - $153,580
    Income Estimation: 
    $109,939 - $144,341
    Income Estimation: 
    $114,500 - $144,633
    Income Estimation: 
    $151,231 - $194,242
    Income Estimation: 
    $188,900 - $249,994
    Income Estimation: 
    $187,890 - $240,773
    Income Estimation: 
    $70,239 - $89,209
    Income Estimation: 
    $88,984 - $115,784
    Income Estimation: 
    $92,017 - $124,111
    Income Estimation: 
    $90,707 - $120,959
    Income Estimation: 
    $91,486 - $118,193
    Income Estimation: 
    $88,984 - $115,784
    Income Estimation: 
    $111,369 - $141,168
    Income Estimation: 
    $117,871 - $153,580
    Income Estimation: 
    $109,939 - $144,341
    Income Estimation: 
    $114,500 - $144,633
    Income Estimation: 
    $111,369 - $141,168
    Income Estimation: 
    $131,745 - $167,716
    Income Estimation: 
    $144,503 - $184,592
    Income Estimation: 
    $102,541 - $137,871
    Income Estimation: 
    $153,752 - $200,235
    View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

    Job openings at TEKsystems

    TEKsystems
    Hired Organization Address Gulfport, MS Full Time
    Job Overview We are seeking a highly skilled Field Operations Specialist to join our team at TEKsystems. As a key member...
    TEKsystems
    Hired Organization Address Gulfport, MS Full Time
    Job Responsibilities The Network Infrastructure Technician will perform a variety of tasks including routine grounds ins...
    TEKsystems
    Hired Organization Address Gulfport, MS Full Time
    Job Description The Telecommunications Engineer will be responsible for performing routine grounds inspections and preve...
    TEKsystems
    Hired Organization Address Tupelo, MS Full Time
    We are seeking an expert Network Field Operations Technician to join our team. In this role, you will be responsible for...

    Not the job you're looking for? Here are some other Applications Security Engineer jobs in the Tempe, AZ area that may be a better fit.

    Applications Engineer (DO-64000212)

    Cirrus Logic, Chandler, AZ

    AI Assistant is available now!

    Feel free to start your new journey!