Security Developer Resume Samples

4.9 (100 votes) for Security Developer Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security developer job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
VS
V Simonis
Velma
Simonis
904 Bogisich Circle
Boston
MA
+1 (555) 643 6910
904 Bogisich Circle
Boston
MA
Phone
p +1 (555) 643 6910
Experience Experience
Houston, TX
Security Developer
Houston, TX
Raynor-Hauck
Houston, TX
Security Developer
  • Automating security testing as part of continuous improvement in product development and release life cycle
  • Development and long term ownership of strategic security frameworks
  • Maintain a roadmap for the development and update of product-oriented security architecture and standards
  • To own and lead technical responses for number of complex RFI/RFP/RFT in competitive situations along with Database, Middleware Architect and other technical managers
  • Leadership with regards to influencing development teams in the organisation at large with respect to application security
  • Very Good Knowledge on ISO development standards and practices
  • To apply information security policies, standards and guidelines to the product development life cycle
Dallas, TX
Application Security Developer
Dallas, TX
Towne, Roberts and Russel
Dallas, TX
Application Security Developer
  • Spring Core
  • Spring MVC, Security
  • Creating design templates and best practices in application security
  • Sharing of information about application security best practices, risks, interpretation of firm-wide standards, etc
  • Collaborating with business and technology partners to understand the firm’s business goals
  • Evaluating existing solutions and providing feedback to strengthen them
  • Providing support in guiding business and technology partners on application security matters
present
Dallas, TX
Senior Security Developer
Dallas, TX
Bruen-Olson
present
Dallas, TX
Senior Security Developer
present
  • Develop and implement any necessary changes to improve security and eliminate vulnerabilities
  • Work with test engineers to develop proper security testing strategies
  • · Perform on-going security testing and code review to improve software security
  • Play an active part in all governance process, ensuring application development adheres to necessary security policies and industry standards
  • Integrate compliance with corporate security and privacy standards into all development activities
  • Develop and maintain technical, security related documentation and training
  • Manages design changes (e.g. version changes, technology refreshes, and other moves/adds/changes)
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Duke University
Bachelor’s Degree in Computer Science
Skills Skills
  • Analyze, develop, maintain, document the product security architecture, design and technological integration involving Oracle Database, Fusion Middleware components, WebLogic Server, ADF, BI Publisher, Webservices and Java Security architecture and implementation
  • Ability to enhance architecture, design and propose technology alternatives (if applicable) for Multifonds product solution offerings by providing security solution and technology subject matter expertise in multiple security technologies e.g. Database Security, Application Security, Web Security, encryption, multi-factor authentication, intrusion detection (IDS), intrusion prevention (IPS), network segregation, SIEM, IDM, IAM and vulnerability management toolsets
  • Strong focus on quality and goal-oriented behavior
  • To own and lead technical responses for number of complex RFI/RFP/RFT in competitive situations along with Database, Middleware Architect and other technical managers
  • Excellent verbal and written communication skills. Ability to communicate with business leaders, users and tech-savvy stakeholders. Create reports and analyze reports for a diverse group of stakeholders Please send resumes to cbarney@apexsystemsinc.com
  • Develop and produce comprehensive and accurate deployment plan, environment plan, vulnerability assessment and management plan, security test plan, integration and compliance plan
  • Research and define the structure of vulnerability management reports for individual technology platforms (e.g. Database, FMW, Web Application, Webservices, Java, IE etc.)
  • Implement appropriate control gates by collaborating and consulting with business areas and identifying risks and developing standards, policies, procedures, guidelines and best practices for coding, testing and implementation and educating the staff about the same to facilitate the adoption and implementation of a consistent technical security architecture
  • Keep abreast of evolving industry practices and regulatory / legal changes to ensure the product technical security architecture enables cost effective security to be delivered as an integral part of overall product offerings
  • Excellent communicator with the ability to influence and educate peers within and beyond GIS as well as more senior leaders
Create a Resume in Minutes

15 Security Developer resume templates

1

Security Developer Resume Examples & Samples

  • Ability to enhance architecture, design and propose technology alternatives (if applicable) for Multifonds product solution offerings by providing security solution and technology subject matter expertise in multiple security technologies e.g. Database Security, Application Security, Web Security, encryption, multi-factor authentication, intrusion detection (IDS), intrusion prevention (IPS), network segregation, SIEM, IDM, IAM and vulnerability management toolsets
  • To apply information security policies, standards and guidelines to the product development life cycle
  • To own and lead technical responses for number of complex RFI/RFP/RFT in competitive situations along with Database, Middleware Architect and other technical managers
  • Maintain a roadmap for the development and update of product-oriented security architecture and standards
  • Automating security testing as part of continuous improvement in product development and release life cycle
2

Senior Application Traffic & Security Developer Resume Examples & Samples

  • Solid experience in Java programming in multi-threaded environment
  • Familiar with object-orientated design principle and methodologies
  • Familiar with enterprise Java programming environment and frameworks in the following areas: J2EE, Servlets/JSP
  • Familiar with web development, in particular the following technologies: JavaScript and browser-side frameworks, AJAX, GWT, CSS, HTML
  • Experience in User Interfaces design
  • Experience with development of relational database-backed applications, solid knowledge of SQL; Hibernate is a significant plus
  • Solid understanding of OS and networking fundamentals and hands on experience with Linux and Windows
  • Hands-on experience with the following tools: Eclipse, Ant, Maven, Jetty
  • Knowledge of XML and related technologies is required
  • Familiarity with any of the following technical areas is a plus: JMX, OSGi, JAAS, Apache Commons library, HTTP, JSON
  • Familiarity with both MySQL and NoSql is a significant plus
  • Experience with Java performance analysis and tools is a significant plus
  • Knowledge of C, C++ is a plus
  • Familiarity with any of the following technical areas is also a plus: TLS/SSL, digital encryption/signature, OAuth, PKI system, Java Keystore and JCE framework
3

Principal Security Developer / Engineer Resume Examples & Samples

  • Conducts advanced systems programming and systems support activities such as new or revised program language codes, processing routines, and report generators
  • Designs, codes, tests, debug and documents complex programs. Performs advanced analysis for the acquisition, installation, modification and support of operating systems, databases, utilities and internet-related tools. Monitors effective language codes, processing routines, hardware utilization and utilization of database management techniques
  • Demonstrates thorough understanding of industry standard technical tools, applications, and procedures. Creativity applies technical knowledge to determine solutions and solves complex problems. Uses experience and analysis to develop creative and innovative solutions. Has diverse business skills and may function as a component project lead
  • Researches, presents and/or makes recommendations on technical issues. Provides constructive performance feedback. Accurately predicts time required to complete development tasks; adheres closely to development plans; and anticipates changes to a product specification or schedule as they become necessary during a development cycle
  • Communicates and mentors other members of the team. Has in-depth knowledge of one subsystem or a breadth of knowledge in several subsystems
  • Personal performance and Valued Behaviors include: effectively interprets and acts on all customer needs of increased complexity, interacts internally and externally on a daily basis to achieve department/work unit goals and initiatives, uses communications skills to influence decisions, provides constructive performance feedback, articulates opinions and helps guide work unit, foresees potential technical or business issues within department and makes recommendations on how to resolve
  • Focused experience in Python, Perl, C/C++, and using APIs
  • Strong understanding of security-related technologies including encryption, IPsec, IDS/IPS, VPNs, stateful firewalls, as well as TCP/IP
  • Understands security operations and functions with the ability to automate tasks
  • Ability to adapt quickly and develop solutions outside of traditional business paradigms
  • Motivated, responsible individuals who require little supervision are desired. Individuals must be able to solve simple to moderately complex problems requiring independent thought
  • Experience with Ruby, XML, SOAP, PHP, Java, SQL are highly desired
  • Also understanding of network device CLI such as routers and switches a plus
  • Bachelor's degree or equivalent experience plus 6-8 years direct job related experience are required. Individuals must demonstrate outstanding customer service skills
4

R&D Senior Security Developer Resume Examples & Samples

  • 5+ years hands on programming experience in Java/C++/Python
  • Solid understanding of Secure Sockets Layer (SSL) protocol related tools/technologies
  • Experience working with digital certificates, trust and key stores as well as tools like OpenSSL
  • Desire and ability to share ideas, excellent verbal and written communication skills
5

Lead Security Developer Resume Examples & Samples

  • 24/7 monitoring of server and website including
  • Monitoring logs of core file changes or attempts at file changes and reacting/correcting as necessary
  • Monitoring of IP addresses attempting backdoor entry and reacting/correcting as necessary
  • Monitoring of all attacks including Brute Force Attacks and reacting/correcting as necessary
  • Monitoring of all applicable load balancing servers for malicious activity and reacting as necessary
  • Monitoring of applicable cloud servers for malicious activity and reacting/correcting as necessary
  • Securing all server and website needs and assisting as necessary
  • Conducting plugin testing for any compatibility issues prior to updating the live website
  • Conducting Wordpress updates and assisting as necessary
  • Working closely with current vendors or aiding in the selection process for any future vendors
  • Additional related responsibilities may be added
  • This position requires the ability to multi-task while staying focused, a solid work ethic, eagerness to perform at the highest level and go the extra mile as needed
  • The position requires excellent interpersonal demeanor, the ability to think creatively while efficiently, excellent presentation, follow-through, organization, and representation
  • Confidentiality is non-negotiable. All confidential business matters must remain internal
6

Information Security Developer Resume Examples & Samples

  • Delivering design, code, support integration testing, support production deployment and providing engineering support to operations
  • Building strong relationships with other AIM teams namely, Enterprise and Web Authentication, LDAP and Identity Data
  • Collaborating with managers and lead engineers of the AIM team, broader technology partners in the Technology Division and Business partners in order to understand technical and business requirements that will drive solutions
  • Hands on solid experience with solution delivery using Java/Goovy scripting, Web technologies (e.g. Angular, Backbone, Bootstrap, Handlebars JS), Java
  • Experience in building secure software
  • Ability to work with remote manager and distributed team
  • Scripting skills in either Python or Perl
  • Prior experience with openIDM or another IdM product
  • Good knowledge/experience of LDAP, Active directory, Kerberos
  • Experience operating in a large, silo'd enterprise
  • Experience with development collaboration systems (e.g., Jira, Gerrit, Stash)
7

Cbmc Cyber Security Developer Resume Examples & Samples

  • Must have a Sec+ or equivalent to start
  • Strong technical skills in the following are required
  • Experience creating, installing, and testing vulnerability fixes to Windows and Unix/Linux platforms
  • Experience with Linux and Windows system administration including installing and configuring systems from the OS level up. Familiarity with RHEL, Unix Scripting, Windows Powershell. Knowledge of XML is required
8

Senior Security Developer Resume Examples & Samples

  • This is an excellent opportunity to join a rapidly growing innovator in a technically challenging and rewarding role
  • Develop and implement any necessary changes to improve security and eliminate vulnerabilities
  • Champion security throughout the development lifecycle and oversee all security and vulnerability related initiatives at the application level
  • Act as a SME (Subject Matter Expert) for the development team
  • Mentor the development teams on application security best practices and identify common coding errors that could pose any security risks
  • Work with test engineers to develop proper security testing strategies
  • Develop and maintain technical, security related documentation and training
  • Evaluate existing and emerging technologies, tools and training to detect, triage and mitigate software security defects
  • Play an active part in all governance process, ensuring application development adheres to necessary security policies and industry standards
  • Integrate compliance with corporate security and privacy standards into all development activities
  • Extensive experience in enterprise software development
  • Experience working with SaaS product companies
  • Knowledge of JavaScript frameworks such as Dojo, Angular, Knockout, Backbone, jQuery is highly desired
  • Silverlight or WPF experience are a plus
9

Senior SW Web Applications & Security Developer Resume Examples & Samples

  • Design and develop server software in the Java environment
  • Create, maintain, and manipulate web application content in HTML, CSS, JavaScript, and Java languages
  • Provide guidance and support to application testing and quality assurance teams
  • Contribute to process diagrams, wiki pages, and other documentation
  • Work in an Agile software development environment
  • Work in Linux and Microsoft environments
10

Junior Application Security Developer Resume Examples & Samples

  • Assemble, install, upgrade, configure, and manage information security systems including hardware, firmware, and integrated applications
  • Provide security consultation and risk assessments for new initiatives and projects
  • Ability to perform application vulnerability assessments to include penetration tests
  • Perform code review across a variety of programming languages including C#, Python, Java, etc
  • Perform assessments of SDLC processes
  • Deliver prompt, courteous, and professional service at all times in a fast-paced work environment
  • Monitor, track and document information security issues and threats to ensure prompt resolution and root cause analysis as needed
  • Participate in on-call support rotation for afterhours support coverage as needed
  • Backup incident response team and assist with any on-going investigations
  • Working knowledge of Linux systems and security best practices
  • Experience in developing and coding multi-tiered Applications
  • Knowledge of HTTP and Web programming
  • Understanding of security industry standards including NIST, ISO, OWASP and CVE
  • Excellent references required
  • DevOps experience including coding in a scripting language like Python
  • Understanding of network protocols such as TCP/IP, HTTP, and SSL
  • Knowledge of common security requirements for Web applications
  • Experience with application security and security operations
  • Awareness of HIPAA and FISMA cybersecurity requirements
  • One or more of the following professional certifications: CompTIA Security+, SANS GIAC, CEH Technologically advanced work environment
11

Info Security Developer, SOC Operations Resume Examples & Samples

  • Participate in security use case brainstorming sessions, documenting use case requirements, and developing use cases focused on advanced correlation
  • Maintain the health of all deployed use cases and correlation rules
  • Design, development, and deployment of production code in support of tools integration
  • Excellent problem solving, critical thinking, and analytical skills - ability to de- construct problems
  • Strong customer service skills and decision-making skills
  • Ability to support and work in a team environment
  • Strong documentation and oral communication skills
  • Ability to manage multiple priorities in a high pressure environment
  • Understanding of IT Security and the ability to apply risk management principles in all aspects IT Security
  • Ability to maintain confidentiality of data
  • Must comply with any regulatory requirements
  • Prior development experience preferred
  • A formal education in Computer Science or a related field; or equivalent experience in IT Security related roles is required
  • Seasoned Python developer with experience in XML, Regex, Splunk Search Processing Language (SPL)
  • Minimum 2+ years performing analysis of logs from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
  • Minimum 2+ years developing use case logic for SIEM architecture
  • Substantial knowledge of IT core infrastructure and cybersecurity components/devices preferred
12

Senior Security Developer Resume Examples & Samples

  • · Contribute to all levels of the architecture
  • · Provide engineering designs for the new software solutions to help mitigate security vulnerabilities
  • · Implement, test and operate advanced software security techniques in compliance with technical reference architecture
  • · Define and enforce secure coding practices
  • · Perform on-going security testing and code review to improve software security
  • · Maintain technical documentation and security standards
  • · Develop a familiarity with new security tools and best practices
  • · Conduct security review and ethical hacking prior to software release
  • · Bachelor’s Degree in Computer Information Systems, Engineering or related (Ideally in computer science or engineering)
  • · 4+ years of IT experience
  • · Ideally holds certification in the professional software security
13

Cyber Security Developer Resume Examples & Samples

  • Analysis of cyber requirements and potential design solutions, providing guidance and direction related to security technologies, performing analysis on cybersecurity collected data and test results, identifying and implementing cybersecurity design, and preparing and maintaining engineering and security related documentation
  • Preparing documentation (artifacts and bodies of evidence) to support certification and accreditation (C&A) activities necessary to ensure system sustained Approval to Operate (ATO)
  • Assist in conducting cybersecurity audits to ensure appropriate implementation and compliance of the security posture
  • Performing systems security engineering and test efforts associated with implementation of security controls on networking devices, databases, operating systems, hardware and software components
  • Performing or assisting with testing of all software with a variety of simulated patterns of common attacks using security testing methodologies, including fuzz testing, vulnerability testing, penetration testing, and misuse and abuse testing throughout the development effort and preparing associated reports for contract leadership and Government customers summarizing the patterns of attacks used, in terms of the Common Attack Pattern Enumeration and Classification (CAPEC) identifiers, during each test activity and for the tests of the final delivery
  • Assessing and maintaining a listing of hardware, firmware, and/or software system security deviations from the approved operational baseline
  • Task and coordinate daily integration activities with team members
  • Experience with analyzing system requirements documents and developing engineering solutions to their written specifications
  • Familiarity with developing Basis of Estimates and determining Level of Efforts to support engineering projects
  • Experience with Linux and Windows system administration including installing and configuring systems from the OS level up
  • Familiarity with RHEL, Unix Scripting, Windows PowerShell is required
  • Experience developing secure applications that are compliant with DISA Security and Technical Implementation Guides (STIGs)
  • The candidate should be able to clearly and succinctly communicate complex concepts, issues, and status
  • VMWare systems administration and installing and configuring VMware
  • CISCO and Juniper firewall installation, configuration and administration
  • DoD security applications systems HBSS and ACAS
  • Experience implementing DoD and Federal IA Certification and Accreditation Processes, assessing and validating compliance with IA controls and developing and maintaining associated certification and accreditation documentation
  • Experience working U.S. Government contract proposals as an Information Assurance/ Information Security Engineering subject matter expert
14

Application Security Developer Resume Examples & Samples

  • Govern, build, and maintain JPMC static scanning complex’s global rules/filters/templates and vendor rulepack updates. Including but not limit to re-certification activities, change impact analysis, effectiveness assessments, and release tests for the crucial application security components
  • Coordinate and facilitate meetings to analyze code, to build application specific custom rules/filters, to implement and maintain the application specific rules/filters
  • 5+ years of hands on software development experience with Java, Python, .Net or other similar language
  • Expert knowledge of NVD, CVSS scoring, risk ranking, threats and vulnerabilities, and performing web application security assessments
  • Understanding of static code analysis tools principles and practices (i.e. HP Fortify, IBM Appscan Resource, Pylint, RATS, Veracode, BlackDuck) with experience providing development teams tangible guidance to remedy vulnerability defects
  • Professional Certifications preferred (i.e. JPMC ASC or CSSLP, GSSP, CISA, CISSP)
15

Senior Cyber Security Developer Resume Examples & Samples

  • Researches methods to compromise systems and security to develop strategies and designs to prevent intrusion
  • Maintains security architectures with development and network engineers through monitoring, provisioning, and review of cyber security system operations
  • Provides recommendation to management for security strategies to enforce policies and protection of sensitive data and systems
  • Designs security infrastructure solutions to meet current and future application systems and services
  • Business Experience – At least 5+ years’ security/software development experience with a minimum of 2+ years’ in cyber security architecture within development and production environments
  • Must have experience in mixed application environments (Linux (UNIX)/Windows
  • Cyber security methodology for detection of malicious activity within network/application traffic
  • Development of systems and strategies that can prevent intrusion from OWASP Top 10, malware, ransomware, and many other infiltration techniques
  • Capable of working with advanced network and software development engineers to research and analyze intrusion methodologies by developing attack vectors to expose system weaknesses
  • Develop solutions for monitoring and support methodologies to mitigate malicious activity within the infrastructure
  • Develop recovery strategies and test scenarios to validate
  • Strong development and networking skills
  • Analysis, troubleshooting and data mining required for forensics analysis of software/network issues related to cyber events
  • Works with ISRM groups on customer surveys, questionnaires, and audits as it relates to security areas within the infrastructure
  • Ability to work independently and in small teams handles multiple tasks simultaneously and adapt quickly to changes
  • Must demonstrate excellent communication skills (verbal and written), good interpersonal skills, and ability to gather and understand requirements
  • Windows and Linux or equivalent UNIX system/development experience
  • Knowledge of working with Web Application Firewall systems such as F5, Imperva, or other WAF systems
  • Experience network systems and/or advance knowledge of network architecture as it relates to creating highly available secure infrastructure
  • Experience in Health Care systems a plus
  • Self-starter with strong problem-solving and analytical skills
  • Effective verbal communication skills
16

Co-op-security Developer Resume Examples & Samples

  • Participate in Software design and project planning
  • Engage in the software development process and lifecycle at Akamai
  • Develop code to be used as part of the SysComm services offered to Akamai
  • Test your code and system and monitor its performance in production
  • Understand and debug complex problems
  • Learn the technologies needed to complete your projects
  • Currently pursuing a Bachelors or Masters in Computer Science or related field and returning to the program after completion of the Co-op
  • 1+ years academic experience/relevant coursework building dynamic websites and APIs
  • 1+ years academic experience/or experience programming in C, C++, Python, Ruby or Java
  • Highly motivated, creative, and organized individual
  • Relevant coursework and/or experience in networking technologies
  • Relevant coursework and/or experience programming in C, C++, Python, or Java
  • Experience with a Unix based OS is a plus
  • Interest in applying security concepts (eg. encryption, authentication, and intrusion detection), communication protocols (eg. SSH, TLS), and libraries (eg. OpenSSH, OpenSSL, LibSodium)
17

Cyber Security Developer Senior Resume Examples & Samples

  • Contribute to the development and execution of plans and strategies for S&T projects and capability development efforts
  • Develop capability development plans for USCYBERCOM capability development efforts that include a development approach, schedule and transition activities to laboratory and operational environments
  • Research and identify capability solutions that have the potential of advancing cyberspace operations concepts and technologies and develop an Analysis and Recommendation Report on as required according to the PMP deliverables schedule
  • Evaluate strategies for the engineering and development of DoD cyber portfolio capabilities in order to identify and create efficiencies by de-conflicting and minimizing duplicative development and investments, and for the integration of capabilities into the DoD architectures and cyber operational plans and provide an Analysis and Recommendation Report according to the PMP deliverables schedule
  • Analyze and provide input for activities that fulfill USCYBERCOM capability requirements through participation in cyberspace-related developmental activities across the Service Cyber Components and USCYBERCOM R&D portfolio
  • Collaborate and confer with Cyberspace Operations capability developers and providers to understand technologies and provide systems engineering-based recommendations as required
  • Evaluate strategies to synchronize Service Cyber Component research and development in support of USCYBERCOM’s prioritized operational requirements based on the current Operational Directives (OPDIR)
  • Participate in monthly and quarterly, In-Process (Design) Reviews (IPRs), and activities for the development and evaluation of cyberspace prototype solutions. Anticipate participation should be no less than 24 activities per year
  • Researches, designs, develops, and/or modifies enterprise-wide systems and/or applications software. Involved in planning of system and development deployment as well as responsible for meeting software compliance standards
  • Evaluates interface between hardware and software, operational requirements, and characteristics of overall system
  • Documents testing and maintenance of system corrections
  • Complete understanding of software development and wide application of science and technology principles, theories and concepts in the field. General knowledge of and understanding of research and development and other related disciplines
  • Proven skills in translating customer requirements into functional software solutions in a DoD cyberspace operational environment
  • Experience in integration of hardware and software systems on complex architectures and knowledge with Cybersecurity R&D activities such as Cyber Defense resilience, malware analysis, insider threat risk mitigation, Cyber Defense Education and Training, Mobile Device Security, and Cloud-based security
18

Security Developer Resume Examples & Samples

  • Participate in the design of new features
  • Development of new features in a dynamic, Agile environment
  • Testing and test automation
  • Support and resolution of existing customer problems
  • Experience in Java, JavaScript, CSS, HTML
  • Experience applying object oriented design and methodologies
  • Familiar with Web Programming, Java REST APIs
  • Familiar with the database technologies
  • Knowledge of the software development cycle
19

Principal Security Developer Resume Examples & Samples

  • Responsible for the software development of security component(s) for Comcast products and systems
  • Subject Matter Expert (SME) in building, optimizing, and implementing secure reusable code and libraries for the TPS organization
  • Contributes design, code, configurations, and documentation for secure components that manage data ingestion, real time streaming, batch processing, data extraction, transformation, and loading across a broad portion of the big data tools and frameworks
  • Help identify gaps and improves the existing security platform to improve quality, robustness, scalability, and security
  • Evaluates new and upcoming big data solutions and makes recommendations for adoption to extend the platform to meet advanced analytics use cases, such as predictive modeling and recommendation engines
  • Performs secure development, quality assurance (QA), and DevOp roles as needed to ensure total end-to-end responsibility of solutions
  • Mentors junior and senior engineers, provides code reviews, feedback, and enables professional growth
  • Must have a solid understanding of enterprise software development, from design and architecture through securing components in production
  • Strong Experience with operations or secure system administration, particularly with Unix/Linux
  • Experience and/or interest in Test Driven Development (TDD) and agile methodologies
  • Experience with developing and securing applications against Data pipeline/routing technologies in large scale environments (e.g. Apache Flink, Apache Kafka, Apache Nifi, Apache Storm, Pivotal Spring Cloud)
  • Experience with open source frameworks such as (e.g. Apache Hadoop, Apache HBase, Apache Accumulo, Apache Spark, Pivotal Greenplum, MongoDB, Elasticsearch, Logstash) to develop and distribute secure applications of large data sets
  • Fluency and understanding of multiple High-Level, System, and/or Scripting programming languages for large scale analysis (e.g. C++, Java, Javascript, Python, R, Ruby, SQL, Scala, Unix Shell/Awk/Sed)
  • Experience in using DevOps tools (e.g. Ansible, Docker, GitHub, Monit, Nagios, Puppet) to automate the configuration of hosting environments, including database administration, and scaling an application to support load changes
  • Fluency in acquiring data securely from APIs, data queues, flat-file, and remote DB sources as well as creating and modifying APIs for downstream consumers and data transformation
  • Familiarity with data visualization tools and techniques (e.g. Apache Zeppelin, Jupyter, Chart.js, Tableau, D3.js)
  • Familiarity of information/network security detection tools, logging systems, network architecture, and threat intelligence, a plus
  • Familiarity with IP networking concepts (TCP/IP, packet capture analysis), a plus
20

Senior Security Developer Resume Examples & Samples

  • Proposes, configures, and implements technical solutions according to established standards and best practices
  • Participates in technology security assessments
  • Documents support guidelines and procedures (e.g.runbooks, operational guides)
  • Experience developing/implementing Cryptographic services
  • Experience with Federation product like CA Siteminder or an equivalent product
  • Must have understanding of enterprise authentication/authorization solution
  • Excellent interpersonal, written and spoken communication skills
  • Building, testing, and integrating infrastructure components or services: 4 years
  • Applying security and controls policies for infrastructure components: 4 years
  • Working with various database systems (Oracle, SQL, etc.): 4 years
  • Encryption or Federation (i.e.: SAML 2.0, OpenID Connect, etc.) services: 4 years
  • Java, C, C++, or C#: 4 years
  • Web development skills, such as HTML5, CSS3, or JavaScript: 4 years
  • Cryptographic Services: 4 years
  • Implementing complex components and services: 4 years
  • Knowledge of Websphere Application/TomCat Server and Apache
  • Experience working with either Encryption (i.e., Data encryption) or Federation (i.e., SAML 2.0, OpenID Connect, etc...) services
  • Large program experience, specifically with implementation of a packaged system
  • Able to negotiate solutions and lead the business teams to consensus
21

Security Developer Resume Examples & Samples

  • 8+ years of hands-on security engineering and coding experience within consumer electronics industry or related field
  • 8+ years of design and coding solutions experience employing industry standard cryptographic protocols and algorithms
  • BS in Computer Science, Computer Engineering, Mathematics or related field, or equivalent experience in industry
  • Experience in three or more of the following areas: cryptographic based protocols and applied cryptography, OS internals and hardening ( e.g., Linux, OS X, Android, Windows); Web application and browser security, Security assessments and pen testing; Authentication and access control; development of security tools and security monitoring
  • MS in Computer Science, Computer Engineering, Mathematics, Cryptography or related field, or equivalent experience in industry
  • Expert ability to analyze and identify security risks and vulnerabilities, and develop solutions
  • Experience utilizing hardware-based security solutions (e.g. Secure Boot, Trustzone, eSE, TPM)
  • Strong application knowledge and development experience involving industry standard cryptographic algorithms/protocols and runtime access control methodologies (MAC/DAC)
  • System-level (firmware, bootloader, kernel) coding experience
  • Proficient with C/C++ coding with the ability to read and debug ARM assembly code
  • Authored multiple security related patents filed or received
  • Publications in technical security journals with peer review
22

SAP Security Developer Resume Examples & Samples

  • At least 5 years in-depth SAP ABAP hands-on development, project implementation and production support experience
  • Key expertise in SAP ABAP
  • In-depth understanding in SAP Web Dynpro development
  • Experience in project management
  • Must have implemented at least 2 full life-cycle SAP projects
  • Some experience with Portal Objects, User Administration and System Administration
  • Strong analytical and logical skills – the ability to resolve issues in a high-pressure environment
  • In depth Knowledge of software development ‘best practices’ and software development life cycle
  • Very effective communicator. Should have excellent written and verbal English language skills
  • Able to quickly learn and adapt
  • Able to work well with IT teams and stakeholder in multiple locations
  • A thorough approach to work
  • Happy to get involved in all stages of the software development lifecycle, including documentation, testing and implementation support
  • Able to present complex subjects to a range of different audiences
23

Security Developer Resume Examples & Samples

  • Develop excellent quality software using agile techniques such as Test Driven Development and Pair Programming
  • Monitoring security logs and taking action against any breaches
  • Be part of the support rota call to track any security alert issue
  • Documentation of investigations and analysis
  • Analysis of any security issues or potential threats to Sky
  • Advise other teams on issues found and how their application can be improved from a security perspective
  • Take an active role in Story definition, assisting QA's and business stakeholders with Acceptance criteria
  • Drive best technology and software development practices into the team with passion and enthusiasm
  • Participate in regular showcases of new work to the product owners and business stakeholders
  • Thorough Java knowledge and experience
  • OWASP top 10 issues and mitigation
  • Knowledge of some other languages (e.g. C#, Groovy, Python, Perl, Scala)
  • Experience in security, specifically customer authentication systems
  • Knowledge of Web Application Firewall (WAF)
  • Ability to analyse data for patterns in user behaviour
  • Understand fundamentals of web applications (HTML, Javascript, CORS)
  • Experience of software design from a set of requirements
24

Cyber Security Developer Resume Examples & Samples

  • Experience with scripting languages (developing, debugging and maintaining)
  • Candidate must be proficient in the use of MS Office products. The candidate should be able to clearly and succinctly communicate complex concepts, issues, and status. The development and testing of patches to fix vulnerabilities in Windows and RHEL. Previous experience in documentation and verification of all installation and configuration steps in documentation to be delivered to the customer. Develop test plans/procedures for software integration and unit test
  • Perform Root cause Analysis and implement mitigation plan
25

Cyber Security Developer Resume Examples & Samples

  • Installing and configuring Linux, Windows, and Solaris from the OS up to the application level
  • Verifying and documenting all installation and configuration steps in correspondence to be delivered to the customer
  • Developing test plans/procedures for software integration and unit test
  • Working with software developers and/or vendors as needed to help diagnose and identify the root cause of problems found during system integration
  • Submitting problem reports for errors found and coordinate daily integration activities with other team members
  • W2 ONLY position! No Corp-to-Corp (C2C) and third-party vendors. Some travel to Colorado Springs may be required.**
  • A Bachelor's degree in an engineering discipline or equivalent years of experience
  • A minimum of 5 years of related experience
  • DoDI 8570 certification (e.g., GSEC, Security+ CE, SCNP, SSCP)
  • Must have a Security + or equivalent to start
  • Experience installing and testing patches on Windows and Linux platforms is required
  • Experience with Information Assurance policies and procedures and the ability to apply IA requirements to an existing system is required
  • Experience with scripting languages (developing, debugging, and maintaining)
  • Proficiency in the use of MS Office products
  • Ability to communicate complex concepts, issues, and status clearly and succinctly
  • Ability and willingness to travel to Colorado Springs, CO
  • Familiarity with Linux and Windows Scripting
  • Knowledge of the following VMware systems administration and installing and configuring VMware
  • Experience with networks
  • Solaris installation, use, configuration and patching experience
26

Information Security Developer Resume Examples & Samples

  • Experience building large applications at scale for large corporations
  • Proven track record for building full stack application
  • Great communications skills to discuss requests with customers
  • Experience leveraging multiple coding languages and applying them to building analysis tools
  • REACT
  • MongoDB
  • PostgreSQL
  • HBase
27

Controls & Cyber Security Developer Resume Examples & Samples

  • Use of a risk-based approach to identify and measure risks
  • Build and maintain awareness of all the controls and cyber security policies that must be conformed to. Use the firm standards when possible, and when not possible create a control that meets the policy in an evidence-able way
  • Clear, complete documentation and communication of controls updates to senior management as well as internal & external auditors and regulators. Produce self-serve reports that show compliance
28

IT Client & Security Developer Resume Examples & Samples

  • Support the Client installed base (Operating system baseline, Compliancy management with Corporate IT and Automation Solution IT standards and policies)
  • Ensure LANDesk Client Agent Coverage to allow optimum manageability and report capability of Client installed base at all times
  • Help planning and implementing refreshed hardware, respecting the Hardware Lifecycle process and the hardware deployment and imaging procedures. Help improving those processes and procedures by providing continuous feed-back to the Transition Team and Design Team when needed
  • Work with ITAM Software Licensing Team to ensure the maintenance of a legitimate software environment
  • Partner with Client Design team and Transition team in order to help improving the Client and Security related Infrastructure Services
  • Produce and maintain up to date all Client Services Operational procedures and documentation
29

Embedded Systems Security Developer Resume Examples & Samples

  • Design, integrate, and maintain common security features across embedded products
  • Prototyping of proposed security features
  • Provide support to internal development groups as a subject matter expert
  • Perform embedded device security assessments throughout the product development lifecycle
  • Work with security test and incident response teams to insure findings are analyzed and addressed
30

Senior Security Developer Resume Examples & Samples

  • Five to six years’ technical experience supporting complex business applications software
  • Five years of experience designing and developing NetIQ Identity Manager User Application, workflows and drivers
  • Three years of experience designing and developing Java applications
  • Three years of experience and proven knowledge of user provisioning life cycle
  • Three years of experience creating, maintaining and enhancing automated and user based workflows with the Workflow/Provisioning module
  • Three years of experience of NetIQ Identity Manager User Application configuration and management
  • Bachelor’s Degree in Computer Science or Engineering; Master’s Degree preferred
  • In-depth technical knowledge and proficiency in the following area
31

Security Developer Resume Examples & Samples

  • Green-field development of proof-of-concept solutions involving cutting edge security techniques
  • Development and long term ownership of strategic security frameworks
  • Leadership with regards to influencing development teams in the organisation at large with respect to application security
  • Define, build and operate the GIS devops pipeline to meet the requirements of the strategic GIS programs
  • Lead the delivery of a large/complex program (initially building API layers for GIS) – coordinating the work of others and ensuring quality and timely delivery
  • Accountable for developing and maintaining standards with respect to application development, SCM, code review and devops
  • Ability to demonstrate deep technical focus on application/system development
  • Must have held roles requiring timely delivery against challenging timescales for complex systems
  • Excellent communicator with the ability to influence and educate peers within and beyond GIS as well as more senior leaders
  • Ability to mentor more junior team members
  • Deep technical expertise in developing systems at scale with at least one of (in order of preference) C,C++, java, ios, .net
  • Knowledge of API security including REST and webservice
  • Ability to debug complex technical issues and hence experience with at least one of the following platforms: windows/desktop, Linux or Android server/mobile
  • Experience with automation (devops) with respect to application development (autotools, make, ant etc..), testing, deployment& documentation
  • Knowledge of application security a must
  • Web application security experience a bonus
  • Mobile application experience a bonus
  • Cryptography, network security & platform security knowledge a bonus
32

Security Developer Resume Examples & Samples

  • Develop detailed requirements for Quality and Sustaining Engineering module within security capability modeling tool
  • Develop detailed user stories for Quality and Sustaining Engineering module within security capability modeling tool
  • Contribute to development of the user interface for Quality and Sustaining Engineering module within security capability modeling tool
  • Contribute to the solution design to ensure the correct data sources are ingested in order to output the appropriate data and images
  • Map out threat vectors for module
  • Engage with other GIS divisions to facilitate mapping of regulatory controls and capabilities
  • Experience in analyzing and responding to advanced cyber threats, technology risk and the motivation/attack vectors of each threat
  • Experience with Agile software development methodology to include developing requirements and user stories
  • Excellent verbal and written communication skills. Ability to communicate with business leaders, users and tech-savvy stakeholders. Create reports and analyze reports for a diverse group of stakeholders Please send resumes to cbarney@apexsystemsinc.com
33

Security Developer Resume Examples & Samples

  • Contribute to security architecture topics
  • Analyze Penetration Testing and Validation results
  • Support Security Architecture Reviews and Threat modelling
  • Contribute to improve the Security Standards
  • Multiplier on security concepts for BusinessObjects suite
  • Support the Design of new security concepts for BusinessObjects suite
  • Transfer learnings from security incidents into security guidelines in accordance with the security strategy
  • Close co-operation with the colleagues in SAP central Security and central Architecture teams
  • Create cookbooks for new topics
  • Improve static code checks
  • Penetration Testing certifications, e.g. C|EH (Certified Ethical Hacker), WAPT (Web Application Penetration Testing), OCSP, CISSP etc
  • Advanced technical skills and experience with JAVA, JavaScript, must be hands-on with penetration testing tools, knowledge of web-based applications will be of advantage
  • Advanced communication skills, specifically presentation and holding meetings
  • Experience with variety of penetration testing tools, e.g. Burp Suite Professional, ZAP, WebInspect
  • A certificate as ethical hacker would be an advantage
  • Experience in network applications
  • Experience in Security Concepts (e.g. Web Security, Session Handling, Authorization, Encryption, Identity Management and Data Privacy)
  • Threat Modeling experience is of advantage
  • Strong focus on quality and goal-oriented behavior
  • 7+ Years of experience in software Development
  • 1+ Years of experience in penetration testing
34

Lead Security Developer Resume Examples & Samples

  • Configure and manage RavenDB optimization, index strategy and security to protect client data and scale system globally
  • Maintain and coordinate development of software integrating with 3rd party APIs including Sophos, Aspose, BCL, MS Office and InDesign, and ensure integration and operating is secure
  • Manage and scale TransPerfect’s SecureAuth Single Sign-On server
  • Architect, test and maintain high-load systems with sensitive client data
  • Conduct security review of code which runs in client browsers, and working with development team to address concerns
  • Explain to managers, stakeholders, and developers any security concerns of applications, budgets, and resources
  • Conduct code reviews in C# and AngularJS applications
  • Work with and maintain remote code repositories, including Team Foundation Server and Git
  • Set up, monitor, and maintain automated code build and release strategy
  • Assess risks of Restful APIs and assisting the development team in resolving them
  • Build and maintain security audit documents, explain security measures to clients, and work with third party security testing team to test products
  • Responsible for dealing with clients in audits and discussing security decisions
  • 3 years of experience designing data models and indexes, and managing RavenDB
  • 3 years of experience integrating with third party APIs, including Sophos, Aspose, BCL, MS Office and InDesign
  • 2 years of experience with C#
  • 1 year of experience with SecureAuth using OAuth2 / OpenId Connect and SAML 2.0 protocols
  • 1 year of experience with AngularJS concepts and best practices
  • Experience may be gained concurrently
35

Application Security Developer Resume Examples & Samples

  • 10+ Years .NET C# Development Experience
  • 10+ Years MS SQL Server Database and T-SQL Experience
  • 10+ Years SOAP Based Web Service Development Experience
  • 4+ Years MVC 4/5 Development Experience
  • 2+ Years .NET RESTful Web API Development Experience
  • Technologies: .NET C#, MS SQL, MVC 4/5, ASP.NET, SAP, JSON, XML, XSLT, SOAP, jQuery, Razor, UNIX, SEOS, Windows Server 2008/2012, TFS, CyberArk, Active Directory, Powerbroker, AWS, Venafi, WCF, WPF
36

Security Developer Resume Examples & Samples

  • Experienced in application security testing (source code review and application penetration tests)
  • ISO27034 (Nice to have)
  • Good understanding of network protocols, design and operations
  • Good English communication skills (written and oral)
  • Willingness to Travel
  • 2+ Years
37

Application Security Developer Resume Examples & Samples

  • Develop security features and tools
  • Work alongside the application development teams on implementing, advising on all security aspects of projects
  • You will be required to perform threat modelling to assist in development projects for applications, new and old
  • Provide guidance on secure coding practices