Logo
Direct Staffing Inc

Web Application Security Engineer

Direct Staffing Inc, San Francisco, CA, United States


Visa candidates are welcome to apply.

Shopping has changed more in the past five years than in the past five decades, and going forward, retailing will require investing more in people and technology. With the rapid changes in retail, it is critical that technology be a strategic enabler for our company to accelerate delivery, be adaptive to market changes, and effective in rapidly delivering solutions to meet the needs of our customers. The Web Application Security Engineer works as a member of the Information Security team.

Primary Responsibilities:

  1. Performs static/dynamic code testing, manual code inspection, threat modeling, design reviews and penetration testing of internal web applications and external partner applications to identify vulnerabilities and security defects.
  2. Supports the implementation and enforcement of secure design principles according to policies, standards, and patterns of Information Security.
  3. Serves as a Subject Matter Expert (SME) in web application security for enterprise projects during development phases to provide Information Security consulting and recommendations, ensuring the implementation of approved security requirements.
  4. Develops and implements manual and automated web application security testing of e-commerce web applications to enforce security standards.
  5. Works with security product vendors and service providers to evaluate security offerings, including product evaluations, proof of concept and pilot installations.

Qualifications:

  1. Bachelor's degree in Computer Science, Software Engineering or related field or equivalent combination of education and experience.
  2. 5-7 years of experience in performing penetration testing, secure code review, static, dynamic and manual source code review.
  3. Experience in identifying and remediating common web application vulnerabilities such as OWASP Top 10.
  4. Experience in use of various commercial and open source penetration testing tools and methodologies and performing penetration testing of web applications and operating systems.
  5. Familiarity with APT attack and kill chains.
  6. Experience with various code repositories including GitHub and Apache Subversion (SVN).
  7. Experience with continuous integration servers such as Jenkins and ElectricCommander.

SCREENING QUESTIONS

  1. Do you have experience performing penetration testing?
  2. Do you have experience identifying vulnerabilities within a web application?
  3. Are you ok working in SF or Pleasanton?
  4. Do you have examples consulting enterprise level development projects?
  5. Are you ok taking a 75 question assessment?

Additional Information

All your information will be kept confidential according to EEO guidelines.

#J-18808-Ljbffr