<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Application Security Engineer III - Cofense in Cybersecurity Job Openings</title>
    <link>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Application-Security-Engineer-III-Cofense/m-p/41394#M15</link>
    <description>&lt;DIV class="col-md-24"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV class="col-md-24"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="col-md-24"&gt;&lt;P&gt;&lt;STRONG&gt;Purpose of Position: &lt;/STRONG&gt;Reporting to the Senior Director - Software Engineering, the Application Security Engineer III is responsible for assisting the Development, Production Engineering, and Security Operations teams with application-level security assessment and threat mitigation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Essential Duties/Responsibilities&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Actively participate in the development of software as a member of a Scrum team&lt;/LI&gt;&lt;LI&gt;Participate in the review of the merge requests from Development and Production Engineering teams to proactively address security concerns before changes are merged to master&lt;/LI&gt;&lt;LI&gt;Actively participate in our agile life-cycle, including planning, grooming, daily stand-ups and retrospectives.&lt;/LI&gt;&lt;LI&gt;Use static code analysis tools to harden the software.&lt;/LI&gt;&lt;LI&gt;Develop and evangelize secure programming standards&lt;/LI&gt;&lt;LI&gt;Perform security reviews of software designs, assisting others to ensure quality and robustness of our products.&lt;/LI&gt;&lt;LI&gt;Perform security focused design reviews considering elements such as: protocols, encryption, data storage, and business logic&lt;/LI&gt;&lt;LI&gt;Validate, address, and document responses to security findings from third-party penetration testing engagements&lt;/LI&gt;&lt;LI&gt;Other duties as assigned&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Knowledge, Skills and Abilities Required&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Passionate about application security and development&lt;/LI&gt;&lt;LI&gt;A self-starter who can identify work that needs to be done without waiting for direction&lt;/LI&gt;&lt;LI&gt;Comfortable mentoring engineers that are globally distributed.&lt;/LI&gt;&lt;LI&gt;Understand OS concepts such as scheduling, interrupt handling, virtualization of computing resources.&lt;/LI&gt;&lt;LI&gt;Able to demonstrate an understanding of JAVA programming skills and are comfortable learning new languages.&lt;/LI&gt;&lt;LI&gt;Comfortable working independently but able to escalate problems when necessary&lt;/LI&gt;&lt;LI&gt;Demonstrate strong oral and written communication skills&lt;/LI&gt;&lt;LI&gt;Willing to mentor and guide fellow team members kindly and constructively&lt;/LI&gt;&lt;LI&gt;Enjoy sharing knowledge via documentation&lt;/LI&gt;&lt;LI&gt;Happy to travel occasionally for team meetings and events&lt;/LI&gt;&lt;LI&gt;Able to write PoC code and documentation that clearly demonstrate vulnerabilities&lt;/LI&gt;&lt;LI&gt;Proficient with (or able to quickly learn) automation tools such as Selenium&lt;/LI&gt;&lt;LI&gt;Able to find solutions to challenging technical puzzles with atypical constraints&lt;/LI&gt;&lt;LI&gt;Able to effectively use git and understand common SCM workflows&lt;/LI&gt;&lt;LI&gt;Able to write code that is intentional and readable, rather than magically obscure&lt;/LI&gt;&lt;LI&gt;Enjoy tinkering&lt;/LI&gt;&lt;LI&gt;Ability to list and demonstrate examples of the OWASP Top 10 preferred&lt;/LI&gt;&lt;LI&gt;Familiarity with TDD/BDD preferred&lt;/LI&gt;&lt;LI&gt;Working knowledge of AWS or other cloud computing platforms preferred&lt;/LI&gt;&lt;LI&gt;Familiarity with proxies, firewalls, mail infrastructure, and other solutions commonly seen in large enterprises preferred&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Education and/or Experience:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Bachelor’s degree preferred.&lt;/LI&gt;&lt;LI&gt;Previous professional, full-stack app-dev experience preferred&lt;/LI&gt;&lt;LI&gt;Have used static analysis security audit tools preferred&lt;/LI&gt;&lt;LI&gt;Experience using CI environments (Jenkins/Docker) preferred&lt;/LI&gt;&lt;LI&gt;Experience performing threat modeling&lt;/LI&gt;&lt;LI&gt;Experience with secure code quality practices and tooling to support quick engagements and rapid analysis - static analysis tools (Coverity, Checkmarx, or similar), dynamic scanning (Rapid 7, AppSpider, or similar), Fuzzing (AFL, Peach, or similar) and code coverage (Bullseye, LDRA, etc) preferred&lt;/LI&gt;&lt;LI&gt;Experience with security incident response activities&lt;/LI&gt;&lt;LI&gt;Experience penetration testing and the usage of web proxies for manual vulnerability assessment&lt;/LI&gt;&lt;LI&gt;Customer support experience (retail, help desk, consulting, etc.) preferred&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For more information and to apply, please visit:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://recruiting.ultipro.com/PHI1008PMINC/JobBoard/2bfae9ff-dc34-4867-b871-a579eae69b54/OpportunityDetail?opportunityId=5b077f49-70ca-4066-afc9-423867ad9402" target="_blank" rel="noopener"&gt;https://recruiting.ultipro.com/PHI1008PMINC/JobBoard/2bfae9ff-dc34-4867-b871-a579eae69b54/OpportunityDetail?opportunityId=5b077f49-70ca-4066-afc9-423867ad9402&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:43:24 GMT</pubDate>
    <dc:creator>fgrimes</dc:creator>
    <dc:date>2023-10-09T09:43:24Z</dc:date>
    <item>
      <title>Application Security Engineer III - Cofense</title>
      <link>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Application-Security-Engineer-III-Cofense/m-p/41394#M15</link>
      <description>&lt;DIV class="col-md-24"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV class="col-md-24"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="col-md-24"&gt;&lt;P&gt;&lt;STRONG&gt;Purpose of Position: &lt;/STRONG&gt;Reporting to the Senior Director - Software Engineering, the Application Security Engineer III is responsible for assisting the Development, Production Engineering, and Security Operations teams with application-level security assessment and threat mitigation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Essential Duties/Responsibilities&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Actively participate in the development of software as a member of a Scrum team&lt;/LI&gt;&lt;LI&gt;Participate in the review of the merge requests from Development and Production Engineering teams to proactively address security concerns before changes are merged to master&lt;/LI&gt;&lt;LI&gt;Actively participate in our agile life-cycle, including planning, grooming, daily stand-ups and retrospectives.&lt;/LI&gt;&lt;LI&gt;Use static code analysis tools to harden the software.&lt;/LI&gt;&lt;LI&gt;Develop and evangelize secure programming standards&lt;/LI&gt;&lt;LI&gt;Perform security reviews of software designs, assisting others to ensure quality and robustness of our products.&lt;/LI&gt;&lt;LI&gt;Perform security focused design reviews considering elements such as: protocols, encryption, data storage, and business logic&lt;/LI&gt;&lt;LI&gt;Validate, address, and document responses to security findings from third-party penetration testing engagements&lt;/LI&gt;&lt;LI&gt;Other duties as assigned&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Knowledge, Skills and Abilities Required&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Passionate about application security and development&lt;/LI&gt;&lt;LI&gt;A self-starter who can identify work that needs to be done without waiting for direction&lt;/LI&gt;&lt;LI&gt;Comfortable mentoring engineers that are globally distributed.&lt;/LI&gt;&lt;LI&gt;Understand OS concepts such as scheduling, interrupt handling, virtualization of computing resources.&lt;/LI&gt;&lt;LI&gt;Able to demonstrate an understanding of JAVA programming skills and are comfortable learning new languages.&lt;/LI&gt;&lt;LI&gt;Comfortable working independently but able to escalate problems when necessary&lt;/LI&gt;&lt;LI&gt;Demonstrate strong oral and written communication skills&lt;/LI&gt;&lt;LI&gt;Willing to mentor and guide fellow team members kindly and constructively&lt;/LI&gt;&lt;LI&gt;Enjoy sharing knowledge via documentation&lt;/LI&gt;&lt;LI&gt;Happy to travel occasionally for team meetings and events&lt;/LI&gt;&lt;LI&gt;Able to write PoC code and documentation that clearly demonstrate vulnerabilities&lt;/LI&gt;&lt;LI&gt;Proficient with (or able to quickly learn) automation tools such as Selenium&lt;/LI&gt;&lt;LI&gt;Able to find solutions to challenging technical puzzles with atypical constraints&lt;/LI&gt;&lt;LI&gt;Able to effectively use git and understand common SCM workflows&lt;/LI&gt;&lt;LI&gt;Able to write code that is intentional and readable, rather than magically obscure&lt;/LI&gt;&lt;LI&gt;Enjoy tinkering&lt;/LI&gt;&lt;LI&gt;Ability to list and demonstrate examples of the OWASP Top 10 preferred&lt;/LI&gt;&lt;LI&gt;Familiarity with TDD/BDD preferred&lt;/LI&gt;&lt;LI&gt;Working knowledge of AWS or other cloud computing platforms preferred&lt;/LI&gt;&lt;LI&gt;Familiarity with proxies, firewalls, mail infrastructure, and other solutions commonly seen in large enterprises preferred&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Education and/or Experience:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Bachelor’s degree preferred.&lt;/LI&gt;&lt;LI&gt;Previous professional, full-stack app-dev experience preferred&lt;/LI&gt;&lt;LI&gt;Have used static analysis security audit tools preferred&lt;/LI&gt;&lt;LI&gt;Experience using CI environments (Jenkins/Docker) preferred&lt;/LI&gt;&lt;LI&gt;Experience performing threat modeling&lt;/LI&gt;&lt;LI&gt;Experience with secure code quality practices and tooling to support quick engagements and rapid analysis - static analysis tools (Coverity, Checkmarx, or similar), dynamic scanning (Rapid 7, AppSpider, or similar), Fuzzing (AFL, Peach, or similar) and code coverage (Bullseye, LDRA, etc) preferred&lt;/LI&gt;&lt;LI&gt;Experience with security incident response activities&lt;/LI&gt;&lt;LI&gt;Experience penetration testing and the usage of web proxies for manual vulnerability assessment&lt;/LI&gt;&lt;LI&gt;Customer support experience (retail, help desk, consulting, etc.) preferred&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For more information and to apply, please visit:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://recruiting.ultipro.com/PHI1008PMINC/JobBoard/2bfae9ff-dc34-4867-b871-a579eae69b54/OpportunityDetail?opportunityId=5b077f49-70ca-4066-afc9-423867ad9402" target="_blank" rel="noopener"&gt;https://recruiting.ultipro.com/PHI1008PMINC/JobBoard/2bfae9ff-dc34-4867-b871-a579eae69b54/OpportunityDetail?opportunityId=5b077f49-70ca-4066-afc9-423867ad9402&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:43:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Application-Security-Engineer-III-Cofense/m-p/41394#M15</guid>
      <dc:creator>fgrimes</dc:creator>
      <dc:date>2023-10-09T09:43:24Z</dc:date>
    </item>
  </channel>
</rss>

