starburst
Application Security Engineer
At a Glance
- Location
- United States
- Experience
- 2–5 years
- Posted
- 2026-02-17T13:00:06-05:00
Key Requirements
Required Skills
Domain Knowledge
- Engineering
Benefits & Perks
nd have access to a comprehensive benefits offering. Actual compensation packages
Requirements
Bachelor’s degree in Computer Science, Engineering, MIS, or equivalent practical experience.
2–5 years of experience in application security, product security, software engineering with a security focus, or a related technical role.
Strong understanding of application vulnerabilities and mitigation strategies (OWASP Top 10, CWE).
Experience with CI/CD tooling, Git-based workflows, and modern development practices.
Familiarity with cloud security concepts and hands-on experience with at least one cloud platform (AWS, Azure, or GCP).
Experience with one or more programming languages such as Python, Go, Java, JavaScript/Typescript, or Ruby. (Java and Python preferred.)
Responsibilities
As a Security Engineer focused on Application and Product Security, you will play a key role in improving the security posture of our applications, services, and development ecosystem. You will work closely with engineering teams to integrate security into the software development lifecycle, build secure-by-default patterns, and ensure that products are resilient against modern threats. This role combines hands-on technical work, security engineering, and collaboration with developers to guide secure design and remediation. You will help implement security controls, perform assessments, and contribute to the continuous improvement of our security program.
Integrate application security best practices into the development lifecycle by partnering with engineering teams and enabling automated security checks within CI/CD pipelines.
Support and maintain Application Security based tooling—including SAST, DAST, SCA, and secrets scanning—and help developers interpret and remediate findings.
Conduct secure code reviews, threat modeling sessions, and application architecture assessments to identify risks and propose mitigation strategies.
Develop and maintain security automation, guardrails, and reusable components.