New Charter Technologies is seeking an Application Security Engineer to join their product engineering team. This role involves serving as the primary security resource for engineering teams, ensuring the security of internal tooling and future public-facing SaaS products.
Responsibilities:
- Serve as the primary security resource for engineering teams in direct close coordination with information security teams, advising on design decisions, authentication patterns, and API security as features are built rather than after the fact
- Conduct lightweight, developer-friendly threat modeling for new features and services, right-sized to the actual audience and risk profile (internal vs. public-facing)
- Lead collaboration between engineering and information security teams through architecture and code reviews with actionable, specific guidance that helps teams ship, not slow down
- Responsible for remediation and enforcement of security standards as set forth by the information security team
- Define and maintain a tiered security standard that distinguishes expectations for internal tooling vs. production SaaS vs. public-facing products
- Engage constructively with the enterprise security organization, translating between compliance and governance language and the engineering team's operational reality
- Responsible for adherence to GitHub Advanced Security (GHAS) configuration and security standards through ongoing tuning across code scanning, secret scanning, Dependabot, and security campaigns within GitHub Enterprise
- Integrate security tooling into CI/CD pipelines as policy-as-code feedback loops, not manual gates
- Develop and maintain GitHub Actions workflows with reusable, security-enforcing components
- Drive remediation velocity metrics and coverage reporting across engineering teams
- Collaborate with information security teams to assess and secure workloads across both Cloudflare and Azure, including Cloudflare Workers, Access policies, WAF, and Zero Trust for public-facing infrastructure, and Azure security controls (Managed Identities, Key Vault, Defender, IAM) for internal and opco-facing services
- Apply platform-appropriate security controls as our architecture spans both environments, calibrating to the risk profile of each workload
- Evaluate and harden authentication flows, API security patterns, and service-to-service trust boundaries across Cloudflare and Azure environments
- Contribute to container and cloud workload security as infrastructure patterns evolve
- Contribute to internal security tooling, automation, and integrations using Python and/or Go
- Build security utilities such as vulnerability aggregation pipelines, policy enforcement tooling, or developer-facing security dashboards
- Collaborate with information security and engineering teams on secure service design patterns, OAuth 2.0/OIDC flows, and API security controls
- Support SOC 2 readiness as the product matures toward public customers, mapping application security controls to Trust Services Criteria
- Triage and prioritize vulnerability findings based on actual business risk rather than CVSS scores alone, distinguishing real issues from noise in a SaaS-native environment
- Partner with GRC and the enterprise security organization on evidence collection and audit preparation, without allowing compliance prep to dominate engineering time
Requirements:
- 7+ years in application security, secure software development, or a closely related discipline
- Demonstrated ability to operate as an embedded security partner within engineering, working side by side with developers
- Deep, hands-on experience with GitHub Advanced Security or equivalent security tooling, including code scanning, secret scanning, Dependabot, and security policy enforcement within GitHub Enterprise
- Experience with threat modeling methodologies (STRIDE, PASTA, or similar) applied to real-world systems, with instinct for right-sizing the process to actual risk
- Proficiency in Python and/or Go, comfortable reading, writing, and reviewing production-grade code
- Strong command of OWASP Top 10, common vulnerability classes, and secure design principles
- Experience securing SaaS or product engineering workloads rather than enterprise IT or perimeter-focused environments
- Experience securing workloads on Cloudflare (WAF, Access, Zero Trust, Workers) and Microsoft Azure (IAM, Managed Identities, Key Vault, Defender), with demonstrated depth in one and working familiarity in the other
- Solid understanding of container security concepts with hands-on Docker experience
- Excellent communication skills, with the ability to translate complex security risk into developer-actionable guidance and executive-level business context
- Familiarity with SOC 2 Trust Services Criteria and how application security controls map to compliance requirements
- Experience with DAST tooling (e.g., OWASP ZAP, Burp Suite Pro) integrated into automated pipelines
- Familiarity with infrastructure-as-code security scanning (Terraform or similar)
- Experience with API security standards including OAuth 2.0, OpenID Connect, and API gateway security patterns
- Relevant certifications such as CSSLP, GWEB, or OSCP
- AI/LLM security awareness, with a practical understanding of how AI-powered applications introduce unique security considerations including prompt injection, data exposure, and model supply chain risks
- Familiarity with MCP (Model Context Protocol) server architectures and the security implications of LLM-to-tool integrations
- Exposure to OWASP Top 10 for LLM Applications or similar emerging AI security frameworks