Application Security Engineer

Company Name:
This role will be responsible for the Application Risk Program Management. The individual will ensure the Security of all applications and systems running in the BCUS domain. This includes understanding all existing web based (Java & .NET) and other third party applications running in the environment, reviewing security provisions of all new applications and major changes in the environment. Penetration testing of various application systems on a regular basis is a required skill along with managing and reviewing the work of other testers including contract testers. Reporting to Management on a regular basis through well-defined metrics is required. This individual should have business acumen and detailed understanding of the Software development lifecycle. Work with application development team leads to ensure application security is aligned with policy, security best practices and business needs
Essential Functions:
Experience and knowledge in a corporate environment with the following;
Support projects within the SDLC and Agile environments with applications security testing penetration testing and vulnerability management functions.
Perform Web / Mobile application security assessments and penetration testing on projects and/or releases; produce detailed risk reports with identified vulnerabilities and remediation recommendations.
Conduct static and dynamic code analysis as needed to support release cycles.
Work closely with development team during the envisioning and development process to guide secure design and secure coding practices.
Manage web application firewall through log analysis, system tuning and
Evaluate, track, and ensure compliance of high and critical vulnerabilities; develop, maintain and update scorecards to reflect vulnerabilities and communicate to end users.
Implement security solutions, and provide technical leadership during the design, development, and testing phases of major initiatives.
Other Responsibilities:
All other related duties as assigned.
Knowledge, Skills, Education, Experience, and Competencies:
Knowledge of the software development lifecycle in a large enterprise environment including agile processes and practices.
Experience with performing manual and automated code review and develop/propose /enforce secure coding standards and policies.
Knowledge of in the OWASP top 10 and related exploitation techniques, including but not limited to cross-site scripting, SQL injections, session hijacking and buffer overflows to obtain controlled access to target systems.
Good Understanding of various web application architectures and web technologies ( Java, MS .NET etc.)
Experience in application firewalls, and intrusion prevention systems (e.g. Mod security) Experience with commercial application scanning tools (DAST) like IBM's AppScan, HP's WebInspect, etc.
Experience with commercial static analysis tools (SAST) like HP's Fortify, Klockworks etc.
In-depth knowledge of any proxying and/or fuzzing tools such as Paros, Burp, WebScarab, OWASP ZAP etc.
Familiar with WebServices technologies like XML, SOAP, and AJAX.
Understanding of server and client side application development , Middleware software's (Oracle's WebLogic, IBM's WebSphere, Apache Tomcat )
Proficiency in utilization of information security tools such as Nmap, Nessus, Burp Suite, Kismet, and Metasploit; manual techniques to exploit vulnerabilities in networks and applications.
Industry security certifications preferred (CISSP, CISA, CCNA etc

Desired Certifications:
Industry certifications preferred CEH, OSCP, GWAPT, LPT or ECSA
Additional certification desirable CSSLP and GSSP

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.