Home/Resume Examples/Application Security Engineer
Cybersecurity

Application Security Engineer Resume Example

Use this application security engineer resume example as a reference. Our AI tailors it to any job description in seconds.

Application Security EngineerApplication SecurityAppSecSecure SDLCSecurity AnalystInformation Security SpecialistSecurity Engineer

Avg. Salary

$110,000 - $165,000

Level

Mid-Senior Level

Application Security Engineer Resume Preview

Alex Johnson
Application Security Engineer  |  alex.johnson@email.com  |  (555) 123-4567  |  San Francisco, CA  |  linkedin.com/in/alexjohnson
Summary
Application security engineer with 5+ years embedding security into software development lifecycles across web, mobile, and API platforms. Experienced in threat modeling, static/dynamic analysis, and working directly with development teams to fix vulnerabilities before they reach production. Skilled in SAST/DAST (SonarQube/Burp Suite), Threat Modeling, Secure Code Review, OWASP Top 10, CI/CD Security, and API Security, Container Security, Penetration Testing with hands-on experience across application security, AppSec, secure SDLC. Strong communicator who works effectively with cross-functional teams including product, design, and QA.
Experience
Senior Application Security EngineerJan 2022 - Present
TechCorp Inc.San Francisco, CA
  • Integrated SAST scanning (SonarQube) and DAST scanning (OWASP ZAP) into 25 CI/CD pipelines, catching an average of 35 high-severity vulnerabilities per sprint before code reached staging environments
  • Conducted threat modeling sessions for 30+ new features and services using STRIDE methodology, identifying 120 potential threats and working with developers to implement mitigations that prevented 4 critical design-level flaws from reaching production
  • Performed manual code reviews on 500+ pull requests in Java and Python codebases, finding and fixing SQL injection, XSS, and insecure deserialization vulnerabilities that automated scanners missed in 15% of cases
  • Built a security champions program with 18 developers across 6 teams who received monthly training on secure coding practices, reducing the number of security-related bugs filed during QA by 45% within the first year
  • Designed and implemented an API security testing framework that validated authentication, authorization, rate limiting, and input validation for 80 API endpoints, catching 22 broken access control issues across 3 microservices
  • Reduced the average time to fix critical application vulnerabilities from 21 days to 5 days by establishing SLAs, providing remediation guidance directly in Jira tickets, and holding weekly triage meetings with engineering leads
Application Security EngineerJun 2019 - Dec 2021
InnovateLabsAustin, TX
  • Developed a secure coding guidelines document covering 12 languages and frameworks used across the organization, which became required reading for all new engineering hires and reduced common vulnerability patterns by 60%
  • Managed the bug bounty program that received 400+ submissions per year, triaging reports within 24 hours, coordinating fixes with development teams, and paying out $85,000 in bounties for 45 valid findings
  • Implemented container image scanning with Trivy across 300+ Docker images in the container registry, blocking deployment of images with critical CVEs and reducing the number of vulnerable containers in production by 80%
  • Performed penetration testing on 3 customer-facing web applications quarterly, consistently identifying 8-12 findings per test including 2 critical authentication bypass vulnerabilities that were patched within 48 hours
  • Automated secret detection in source code repositories using GitLeaks integrated into pre-commit hooks, catching 150+ hardcoded credentials and API keys in the first month that were rotated and moved to HashiCorp Vault
Education
Bachelor of Science in Computer Science, University of California, Berkeley - Berkeley, CA2019
Skills

Languages & Frameworks: SAST/DAST (SonarQube/Burp Suite), Threat Modeling, Secure Code Review, OWASP Top 10

Tools & Infrastructure: CI/CD Security, API Security, Container Security, Penetration Testing

Methodologies & Practices: Python/Java, Security Champions Program

Projects

Security Controls Modernization Project - Improved security posture across systems by tightening controls around SAST/DAST (SonarQube/Burp Suite). Documented risks, partnered with engineering teams on remediation, and created repeatable evidence for audits and reviews.

Incident Response and Risk Reduction Program - Built playbooks, reporting workflows, and monitoring improvements connected to Threat Modeling, Secure Code Review, OWASP Top 10. Reduced response ambiguity and gave leadership clearer visibility into active risks and mitigation progress.

Certifications

Certified Secure Software Lifecycle Professional (CSSLP)

GIAC Web Application Penetration Tester (GWAPT)

Offensive Security Web Assessor (OSWA)

Professional Summary

Application security engineer with 5+ years embedding security into software development lifecycles across web, mobile, and API platforms. Experienced in threat modeling, static/dynamic analysis, and working directly with development teams to fix vulnerabilities before they reach production.

Key Skills

SAST/DAST (SonarQube/Burp Suite)Threat ModelingSecure Code ReviewOWASP Top 10CI/CD SecurityAPI SecurityContainer SecurityPenetration TestingPython/JavaSecurity Champions Program

What to Include on a Application Security Engineer Resume

  • A concise summary that states your application security engineer experience level, strongest domain, and the business problems you solve.
  • A skills section that mirrors the job description language for SAST/DAST (SonarQube/Burp Suite), Threat Modeling, Secure Code Review, OWASP Top 10.
  • Experience bullets that connect application security, AppSec, secure SDLC to measurable outcomes such as cost savings, faster delivery, better quality, or improved customer results.
  • Tools, platforms, certifications, and methods that are current for cybersecurity roles.
  • Recent projects that show ownership, cross-functional work, and a clear result instead of generic responsibilities.

Sample Experience Bullets

  • Integrated SAST scanning (SonarQube) and DAST scanning (OWASP ZAP) into 25 CI/CD pipelines, catching an average of 35 high-severity vulnerabilities per sprint before code reached staging environments
  • Conducted threat modeling sessions for 30+ new features and services using STRIDE methodology, identifying 120 potential threats and working with developers to implement mitigations that prevented 4 critical design-level flaws from reaching production
  • Performed manual code reviews on 500+ pull requests in Java and Python codebases, finding and fixing SQL injection, XSS, and insecure deserialization vulnerabilities that automated scanners missed in 15% of cases
  • Built a security champions program with 18 developers across 6 teams who received monthly training on secure coding practices, reducing the number of security-related bugs filed during QA by 45% within the first year
  • Designed and implemented an API security testing framework that validated authentication, authorization, rate limiting, and input validation for 80 API endpoints, catching 22 broken access control issues across 3 microservices
  • Reduced the average time to fix critical application vulnerabilities from 21 days to 5 days by establishing SLAs, providing remediation guidance directly in Jira tickets, and holding weekly triage meetings with engineering leads
  • Developed a secure coding guidelines document covering 12 languages and frameworks used across the organization, which became required reading for all new engineering hires and reduced common vulnerability patterns by 60%
  • Managed the bug bounty program that received 400+ submissions per year, triaging reports within 24 hours, coordinating fixes with development teams, and paying out $85,000 in bounties for 45 valid findings
  • Implemented container image scanning with Trivy across 300+ Docker images in the container registry, blocking deployment of images with critical CVEs and reducing the number of vulnerable containers in production by 80%
  • Performed penetration testing on 3 customer-facing web applications quarterly, consistently identifying 8-12 findings per test including 2 critical authentication bypass vulnerabilities that were patched within 48 hours
  • Automated secret detection in source code repositories using GitLeaks integrated into pre-commit hooks, catching 150+ hardcoded credentials and API keys in the first month that were rotated and moved to HashiCorp Vault

ATS Keywords for Application Security Engineer Resumes

Use these terms naturally where they match your experience and the job description.

Role keywords

application security engineer

Technical keywords

SAST/DAST (SonarQube/Burp Suite)Threat ModelingSecure Code ReviewOWASP Top 10CI/CD SecurityAPI SecurityContainer SecurityPenetration Testing

Process keywords

code reviewthreat modeling

Impact keywords

application securitysoftware security

Recommended Certifications

  • Certified Secure Software Lifecycle Professional (CSSLP)
  • GIAC Web Application Penetration Tester (GWAPT)
  • Offensive Security Web Assessor (OSWA)

What Does a Application Security Engineer Do?

  • Design, develop, and maintain software solutions using SAST/DAST (SonarQube/Burp Suite), Threat Modeling, Secure Code Review and related technologies
  • Collaborate with cross-functional teams including product managers, designers, and QA engineers to deliver features on schedule
  • Write clean, well-tested code following industry best practices for application security and AppSec
  • Participate in code reviews, technical discussions, and architecture decisions to improve system quality and team knowledge
  • Troubleshoot production issues, optimize performance, and ensure system reliability across all environments

Resume Tips for Application Security Engineers

Do

  • Quantify impact with specific numbers - team size, users served, performance gains
  • List SAST/DAST (SonarQube/Burp Suite), Threat Modeling, Secure Code Review prominently if they match the job description
  • Show progression - more responsibility and scope in recent roles

Avoid

  • Vague phrases like "responsible for" or "helped with" without specifics
  • Listing every technology you have ever touched - focus on what is relevant
  • Including outdated skills that are no longer industry standard

Frequently Asked Questions

How long should a Application Security Engineer resume be?

One page is ideal for most Application Security Engineer roles with under 10 years of experience. If you have 10+ years, major leadership scope, publications, or highly technical project history, two pages can work as long as every section is relevant.

What skills should I highlight on my Application Security Engineer resume?

Prioritize skills that appear in the job description and match your real experience. For Application Security Engineer roles, SAST/DAST (SonarQube/Burp Suite), Threat Modeling, Secure Code Review, OWASP Top 10 are strong starting points, but the final list should reflect the specific posting.

How do I tailor my resume for each Application Security Engineer application?

Compare the job description with your summary, skills, and most recent bullets. Add exact-match terms like application security, AppSec, secure SDLC, code review, threat modeling where they are truthful, then reorder bullets so the most relevant achievements appear first.

What should I avoid on a Application Security Engineer resume?

Avoid generic responsibilities, long paragraphs, outdated tools, and soft claims without evidence. Replace phrases like "responsible for" with action verbs and measurable outcomes.

Should I include projects on a Application Security Engineer resume?

Include projects when they prove relevant skills or fill gaps in work experience. Strong projects show the problem, your role, the tools used, and the result. Skip personal projects that do not relate to the job.

Build your Application Security Engineer resume

Paste a job description and get a tailored, ATS-optimized resume in 20 seconds.

Generate Resume Free

No credit card required

Explore More Resume Examples