Application Security Engineer
Role details
Job location
Tech stack
Job description
This role is part of Bright Vision Technologies' in-house Statement of Work (SOW) engagement. The client, end customer, and employer for this position is Bright Vision Technologies - there is no third-party client, vendor, or implementation partner involved. We do not engage in C2C, 1099, or third-party arrangements for this role. BUT STRICTLY NO C2C/1099/3RD PARTY COMPANIES. ALL OUR ROLES ARE W2 AND NO 3RD PARTY BROKERING PLEASE. Candidates must be willing to work directly as a full-time W2 employee of Bright Vision Technologies and contribute to our in-house SOW deliverables. No new H1B sponsorship is available for this role. However, candidates who are currently on a valid H1B visa and require a transfer are welcome to apply. We will support H1B transfers for qualified candidates. For every role, a technical coding assessment is mandatory. Please apply only if you are confident in your technical abilities and hands-on experience., We are looking for an Application Security Engineer to embed security throughout the software development lifecycle, partnering with engineering teams to design secure systems, identify vulnerabilities, and reduce risk across our application portfolio. The role blends hands-on offensive and defensive skills with strong communication and collaboration, helping development teams build secure software efficiently rather than slowing them down. The ideal candidate brings deep technical security expertise, strong software engineering fundamentals, and a track record of shipping security improvements that meaningfully reduce risk in production. Key Responsibilities
- Conduct threat modeling and security architecture reviews for new and existing applications and services.
- Perform manual code reviews, secure design consultations, and pair with engineering teams on hardening critical components.
- Operate and tune SAST, DAST, IAST, SCA, and secret-scanning tools across CI/CD pipelines.
- Drive vulnerability management workflows including triage, prioritization, owner assignment, and SLA tracking.
- Build paved-road libraries and frameworks that make secure patterns the default for engineering teams.
- Lead red-team and purple-team exercises against internal applications and drive remediation of identified weaknesses.
- Implement and operate runtime protections including WAF, RASP, bot protection, and abuse-detection mechanisms.
- Design and enforce secure authentication, authorization, session management, and cryptographic patterns.
- Partner with infrastructure and platform teams to harden container, Kubernetes, and cloud environments.
- Develop and deliver application security training, lunch-and-learns, and onboarding content for engineering staff.
- Respond to security incidents involving application vulnerabilities or active exploitation.
- Track and apply emerging threats and CVEs that may affect the application portfolio.
- Maintain comprehensive, current technical documentation - including architecture diagrams, design decisions, configuration references, runbooks, and operational procedures - so that the system remains supportable, auditable, and easy to onboard new engineers onto over time.
- Stay current with application security research and emerging defensive tooling.
Requirements
Do you have experience in Security engineering?, Do you have a Bachelor's degree?, * Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- Five or more years of application security or security engineering experience.
- Strong understanding of OWASP Top 10, common vulnerability classes, and modern exploit patterns.
- Hands-on experience performing code review across at least two major languages.
- Deep familiarity with SAST, DAST, SCA, and CI/CD-integrated security tooling.
- Strong understanding of authentication, authorization, and cryptographic primitives.
- Experience with cloud security and modern infrastructure controls.
- Strong communication skills with technical and non-technical audiences.
- Proficiency in at least one programming language for tooling and automation.
- Experience working closely with engineering teams in an Agile environment., * Industry certifications such as OSCP, OSCE, GWAPT, or CISSP.
- Experience with offensive security tooling and red-team operations.
- Bug bounty experience, public CVEs, or open-source security contributions.
- Familiarity with AI/LLM application security considerations.
- Exposure to regulated industries with strict compliance requirements.