Application Security Engineer
Resume Template

A free Application Security Engineer (AppSec) resume, pre-filled and ready to edit. Replace the highlighted placeholders (review languages, SAST/DAST/SCA tools, OWASP framework, bug bounty metrics) using the side panel on the left, and the resume rewrites itself as you type. Save as PDF when you're done.

Emmanuel Gendre - Former Google Recruiter and Tech Resume Writer

Authored by

Emmanuel Gendre

Tech Resume Writer

Interactive resume template generator

Interactive Application Security Engineer Resume Template

Edit the side panel. The resume rewrites itself live. Save as PDF when you're done.

Edits update live as you type. Toggle Edit to rewrite paper text directly.

Edit mode is on. Click anywhere on the resume to rewrite text. Side-panel placeholders still update live.

Mia Castellanos Application Security Engineer

San Francisco, CA appsec@gmail.com +1 415-555-0184

Profile Summary

  • Application Security Engineer with 9 years of experience hardening consumer SaaS platforms across consumer cloud storage, collaboration, and content platforms, specializing in secure code review, threat modeling, and developer enablement.
  • Solid technical background across review languages (Java, Python), SAST (Semgrep, SonarQube), DAST (Burp Suite, OWASP ZAP), SCA (Snyk, Dependabot), and security frameworks (OWASP ASVS), with strong fundamentals in secure-by-default design, automated triage, and developer enablement.
  • Deep expertise in secure SDLC and shift-left practices, threat modeling and secure design review, SAST, DAST, and SCA triage, and API and microservices security, applying practices such as OWASP ASVS-driven control mapping and security champions enablement to deliver secure, audit-ready, and developer-friendly software.
  • Engaged collaborator working cross-functionally with Engineering, Product, and Platform Security leadership in DevSecOps-first engineering organizations, contributing to design reviews, sprint planning, and post-incident retrospectives with a pragmatic, ownership-first mindset.
  • Senior practitioner who shares technical excellence and fosters a culture of low-friction security and paved-road tooling through pattern authoring and design coaching, while leading the security champions network and authoring widely adopted secure-coding guidelines.

Technical Skills

SDLC & Shift-Left:
Threat modeling integration, secure design reviews, security gates in CI/CD, requirements-phase security analysis, release-gate sign-off
Threat Modeling & Design:
STRIDE, PASTA, attack trees, MITRE ATT&CK mapping, Microsoft Threat Modeling Tool, data-flow diagrams
Code Review & Languages:
Java, Python, JavaScript / TypeScript, Go, C#, Ruby, manual + tool-assisted review, business-logic flaws
AppSec Tooling:
Semgrep, SonarQube, Checkmarx, Veracode, Burp Suite Pro, OWASP ZAP, Snyk, Dependabot, Mend
OWASP & Vuln Expertise:
OWASP Top 10 (web + API), ASVS, SAMM, CWE / CVE analysis, injection, SSRF, IDOR, deserialization, XXE
API & Microservices:
REST, GraphQL, gRPC, OAuth 2.0, OIDC, JWT, RBAC / ABAC, rate limiting, schema validation
Auth, Crypto & Secrets:
TLS configuration, OAuth flows, MFA, password hashing (Argon2, bcrypt), HashiCorp Vault, KMS guidance
Bug Bounty, Pentest & Metrics:
HackerOne, Bugcrowd, pentest vendor management, vulnerability triage, MTTR scorecard, security champions program

Education

University of Southern California B.S. in Computer Science (Security & Privacy track)
Los Angeles, CA Sep 2010 - May 2014

Work Experience

Dropbox Senior Application Security Engineer
San Francisco, CA Aug 2018 - Present
  • Lead application security across the Dropbox engineering SDLC spanning 180+ repos and 240+ services, coordinating threat modeling, secure code review, and security tooling with influence across 350 engineers across 18 product teams.
  • Run threat-modeling sessions using STRIDE and attack-tree analysis on every greenfield design, leading ~28 sessions per quarter and shipping documented mitigations on 94% of high-risk threats before code merge.
  • Operate the secure code-review program across 180+ repos in Java, Python, and Go, cutting net-new vulnerability introductions from 42 to 9 per quarter through targeted pattern reviews and shift-left education.
  • Tune Semgrep SAST and Snyk SCA across the monorepo, closing 3,400+ findings in the past year and holding false-positive rate under 8% through curated rule sets and policy-as-code triage.
  • Drive OWASP ASVS Level 2 coverage across tier-1 services, mapping controls into Jira and clearing all 14 high-risk OWASP Top 10 categories before the SOC 2 audit window.
  • Hardened 128 REST and GraphQL APIs with OAuth 2.0 + OIDC + JWT auth, RBAC + ABAC authorization, and schema validation per the OWASP API Security Top 10, retiring 22 broken-object-level-auth patterns.
  • Manage the HackerOne bug bounty program handling ~140 valid reports per year, triaging and resolving findings within an MTTR (critical severity) of 6 days (down from 22 days).
Lyft Application Security Engineer
San Francisco, CA Jul 2014 - Jul 2018
  • Built the security champions network of 24 engineers across all product teams, running monthly office hours and a 6-week secure-coding curriculum that 120+ engineers completed.
  • Built the AppSec scorecard tracking MTTR on critical vulnerabilities, cutting from 34 days to 8 days over 24 months through tightened SLAs and exec-level monthly reporting.
  • Mentored 5 mid-career engineers through OSCP, CSSLP, and AWS Security Specialty paths, and co-authored the team's secure-coding wiki adopted by 4 sister teams.
  • Partnered with Platform, SRE, and Privacy teams across 6 product surfaces, authoring 18 secure-coding runbooks and onboarding 3 new AppSec engineers into the team's review workflow.

Done editing? Download as a real, vector PDF. Selectable text, ATS-friendly, US Letter format.

About this template

An AppSec
Resume Template, by an Engineering CV Writer.

Quick intro: 12 years recruiting in tech, including many years at Google, and I now run an engineering CV writer practice focused on security candidates. AppSec rewrites are a steady part of the queue. The pattern is consistent: the work is review-heavy and conversational (PRs, design docs, threat models), the resume reads like a tool inventory, and the influence gets buried. Hiring panels want to see vulnerability classes you eliminated, design reviews you changed, and a champions network you actually built. The skeleton below is shaped by what gets short-listed.

The paid rewrite is a guided walk through your actual story: the threat models you ran, the SAST queue you took from thousands to dozens, the bug bounty program you tightened, the auth flow you refused to ship until it was fixed, the engineers you turned into security champions. Plenty don't need that. Sometimes a tight, AppSec-shaped skeleton with the right numbers in the right places is the missing piece. That's what this template is. Free, no signup, ATS-clean. Have a swing at it.

How it works

How to use this template
to write an AppSec Engineer resume

The structure here was written by a former Google recruiter. The placeholders force you to be specific exactly where it matters: review languages, SAST/DAST/SCA, threat modeling, OWASP coverage, API auth, and bug bounty MTTR.

Strong AppSec bullets aren't written in one pass. They build through five stages. Stage one names the activity. Stages two and three add the tools you used and the codebase surface they applied to. Stage four shows the security-engineering practice behind the work. Stage five quantifies the result. Bullets that complete stage five are the ones a hiring panel flags for the phone screen. The full framework lives in How to Write Bullet Points for Tech Resumes.

  1. 01 Task What you did
  2. 02 Tools Semgrep, Burp, Snyk, HackerOne
  3. 03 Surface Repos, services, APIs
  4. 04 Practice STRIDE, ASVS, paved roads
  5. 05 Metric Vulns cut, MTTR, coverage

This template bakes the five stages directly into your bullets so the framework runs in the background. The side panel maps cleanly: language and tool picks fill stage 2, repo / service / API counts fill stage 3, the framework and practice fields fill stage 4, the before / after metric inputs hit stage 5. The sentence skeletons cover stage 1. Why this matters: you only need to drop in real tools and real numbers. The structure does the rest, and the resume reads at stage 5.

  1. Pick your stack

    Tap a chip to swap Java for Python or Go, Semgrep for SonarQube or Checkmarx, Burp for OWASP ZAP, Snyk for Dependabot or Mend, OWASP ASVS for SAMM or NIST SSDF. Every mention updates at once.

  2. Drop in your numbers

    Repos and services in scope, threat-model sessions per quarter, vulnerabilities before / after, SAST findings closed, false-positive rate, API count, bug bounty MTTR, champions network size. Don't have yours yet? The defaults pass for a senior AppSec resume.

  3. Save as PDF

    Click Download. The page generates a real vector PDF with selectable text and clean US Letter formatting. ATS-parsable.

Resume Sample

Application Security Engineer Resume Examples

Three sample application security engineer resumes at different career stages: a junior AppSec engineer at a bug-bounty platform, a senior AppSec engineer at a cloud-security vendor, and a principal AppSec engineer at a Fortune-500 financial services firm. Use them as inspiration when filling the template above.

Junior AppSec Engineer Resume Sample 3 years

Junior AppSec Engineer Resume Example

QA-to-AppSec pivot at a bug-bounty platform. Triages SAST findings and runs ASVS L1 reviews across 18 internal services.

Kai Ueno

Junior Application Security Engineer

San Francisco, CA · kai.ueno@gmail.com · +1 415-555-0136 · linkedin.com/in/kaiueno

Profile Summary
  • Junior Application Security Engineer with 3 years of security experience pivoting from QA into AppSec at a bug-bounty platform, owning SAST triage and ASVS L1 reviews across 18 internal services.
  • Hands-on coverage across Ruby, JavaScript / TypeScript, Semgrep, Snyk, OWASP ZAP, and HackerOne, with working knowledge of OAuth 2.0 and OWASP Top 10.
  • Cross-functional partner working with Engineering and Security Operations teams in an Agile environment, contributing to weekly triage and quarterly ASVS reviews.
  • Closed 420+ SAST findings in the past year and validated ~60 bug bounty reports under a senior engineer's mentorship.
Technical Skills
Languages:
Ruby (read + small fixes), JavaScript / TypeScript, Python (scripting), basic Java
AppSec Tooling:
Semgrep (daily), Snyk (CLI + UI), OWASP ZAP, Burp Suite Community, GitHub code scanning
OWASP & Vuln Expertise:
OWASP Top 10 (web), ASVS Level 1 reviews, CWE / CVE basics, injection / IDOR / SSRF triage
Threat Modeling:
STRIDE walkthroughs (under mentorship), data-flow diagrams, basic attack-tree analysis
Bug Bounty:
HackerOne triage flow, duplicate review, severity scoring (CVSS 3.1), report writing
Certifications:
CompTIA Security+, OSCP (in progress), HackTheBox Pro Hacker rank
Education
San Jose State University B.S. in Cybersecurity San Jose, CA · Sep 2019 - May 2023
Work Experience
HackerOne Junior Application Security Engineer San Francisco, CA · Jun 2023 - Present
  • Triage SAST findings across 18 internal services on a weekly cadence, closing 420+ Semgrep + Snyk findings in the past year and shipping 22 fix-PRs into shared Ruby and TypeScript libraries.
  • Validated ~60 bug bounty reports on the company's own program across web and API surfaces, with senior engineer review on critical-severity items.
  • Authored the team's OWASP ZAP onboarding runbook, adopted by 3 new starters in the past year.
  • Contributed to 4 STRIDE threat-modeling sessions on greenfield internal tools and documented the resulting mitigations.
Lever QA Engineer (Security focus) San Francisco, CA · Jul 2022 - May 2023
  • QA engineer with a security focus, writing automated tests for auth flows and IDOR regressions across the recruiting platform.
  • Built 14 security-focused Cypress tests covering RBAC boundaries and session handling.
  • Earned Security+ and started OSCP during the role; pivoted to AppSec at HackerOne.

Senior AppSec Engineer Resume Sample 7 years

Senior AppSec Engineer Resume Example

Cloud-security vendor AppSec IC. Owns the threat-modeling and SAST program across the platform's 90+ Go and TypeScript services.

Sienna Brookes

Senior Application Security Engineer

New York, NY · sienna.brookes@gmail.com · +1 212-555-0148 · linkedin.com/in/siennabrookes

Profile Summary
  • Senior Application Security Engineer with 7 years of AppSec experience at a cloud-security vendor, owning the threat-modeling and SAST program across the platform's 90+ Go and TypeScript services.
  • Hands-on coverage across Go, TypeScript, Semgrep, CodeQL, Burp Suite Enterprise, Snyk, Dependabot, and HackerOne, with deep fluency in OWASP ASVS L2 reviews.
  • Deep expertise in STRIDE + PASTA threat modeling, Semgrep custom-rule authoring, API Security Top 10, and bug bounty triage at scale.
  • Cross-functional partner working with Platform, SRE, and Detection Engineering across SOC 2 + ISO 27001 audit cycles, chairing the bi-weekly secure-design review.
  • AppSec mentor for 3 mid-career engineers, co-author of the company's security-champions playbook adopted by 4 product teams.
Technical Skills
Languages:
Go (deep), TypeScript / JavaScript (deep), Python (scripting), Rust (read-only)
SDLC & Shift-Left:
Secure design reviews, threat modeling integration, CI security gates, release sign-off
Threat Modeling:
STRIDE, PASTA, attack trees, Microsoft Threat Modeling Tool, MITRE ATT&CK
AppSec Tooling:
Semgrep (custom rules), CodeQL, Burp Suite Enterprise, OWASP ZAP, Snyk, Dependabot, GHAS
OWASP & Vuln Expertise:
OWASP Top 10 (web + API), ASVS Level 2, SAMM, IDOR / SSRF / deserialization, business-logic flaws
API & Microservices:
REST + gRPC, OAuth 2.0, OIDC, JWT, fine-grained authz, rate limiting, schema validation
Auth, Crypto & Secrets:
TLS hardening, password hashing (Argon2id), HashiCorp Vault, AWS KMS, signed-URL patterns
Bug Bounty & Pentest:
HackerOne triage, severity scoring (CVSS 3.1), pentest vendor management, OSCP, CSSLP
Education
New York University B.S. in Computer Science New York, NY · Sep 2015 - May 2019
Work Experience
Wiz Senior Application Security Engineer New York, NY · Apr 2022 - Present
  • Own the threat-modeling and SAST program for the platform's 90+ Go and TypeScript services, supporting 140 engineers across 7 product squads.
  • Authored 62 custom Semgrep rules targeting Wiz's internal anti-patterns (sensitive API misuse, tenant-scope violations), cutting net-new vulnerabilities per quarter from 28 to 6.
  • Run ~22 STRIDE + PASTA threat-modeling sessions per quarter on greenfield designs, shipping mitigations on 95% of high-risk threats before merge.
  • Hardened 72 REST and gRPC APIs against the OWASP API Security Top 10, retiring 14 broken-object-level-auth patterns across the platform.
  • Triaged ~110 bug bounty reports per year on HackerOne, cutting MTTR on critical findings from 18 days to 4 days.
  • Mentored 3 mid-career engineers through OSCP and CSSLP, and co-authored the company's security-champions playbook.
Sumo Logic Application Security Engineer Redwood City, CA · Jul 2019 - Mar 2022
  • Ran secure code review across 40 Java + Scala services on the observability product, closing 1,200+ SAST findings over 32 months.
  • Built the team's CodeQL + Semgrep CI gate, blocking critical-severity issues at merge and cutting escape rate by ~60%.
  • Cleared the SOC 2 Type II AppSec scope across 2 audit cycles with zero findings.
  • Authored 14 OWASP ZAP automation scripts for the team's nightly DAST runs.

Principal AppSec Engineer Resume Sample 12 years

Principal AppSec Engineer Resume Example

Fortune-500 financial services AppSec lead. Owns the firm-wide AppSec program across 600+ repos and 1,200 engineers.

Henry Asare

Principal Application Security Engineer

Boston, MA · henry.asare@gmail.com · +1 617-555-0192 · linkedin.com/in/henryasare

Profile Summary
  • Principal Application Security Engineer with 12 years of AppSec experience at a Fortune-500 financial services firm, owning the firm-wide AppSec program across 600+ repos and 1,200 engineers.
  • Hands-on coverage across Java, C#, Python, Checkmarx, Veracode, Burp Suite Enterprise, Snyk, HackerOne, and Splunk Enterprise Security, with deep fluency in OWASP ASVS L3 and FFIEC handbooks.
  • Deep expertise in regulated-industry AppSec program design, SAST/DAST tool consolidation, PCI DSS + FFIEC application controls, and org-scale security-champions networks.
  • Org-level partner working with the CISO, application-engineering VPs, Internal Audit, and External Audit on PCI DSS, SOC 2, FFIEC, and NYDFS examinations across 5 product lines.
  • Principal IC chairing the firm-wide AppSec Council, authored 140+ ADRs and standards, and runs the firm's annual AppSec maturity assessment.
Technical Skills
Languages:
Java (deep), C# (deep), Python (deep), JavaScript / TypeScript, Kotlin, Scala (read-only)
SDLC & Programs:
Firm-wide SDLC standards, secure design review at scale, NIST SSDF + OWASP SAMM L3 maturity
Threat Modeling:
STRIDE, PASTA, attack trees, MITRE ATT&CK, application-level kill-chain modeling
AppSec Tooling:
Checkmarx, Veracode, Semgrep, CodeQL, Burp Suite Enterprise, OWASP ZAP, Snyk, GitHub Advanced Security
OWASP & Vuln Expertise:
OWASP Top 10 (web + API + mobile), ASVS Level 3, SAMM L3, CWE / CVE deep analysis, business-logic abuse
API & Microservices:
REST, GraphQL, gRPC, OAuth 2.0, OIDC, JWT, fine-grained authz (Zanzibar-style), API gateway policy
Compliance & Audit:
PCI DSS, SOC 2 Type II, FFIEC, NYDFS 23 NYCRR 500, NIST 800-53, audit-evidence pipelines
Leadership & Programs:
AppSec Council chair, security-champions network (60+ members), pentest vendor management, board-level reporting
Education
Carnegie Mellon University M.S. in Information Security Pittsburgh, PA · Sep 2012 - May 2014
Work Experience
Fidelity Investments Principal Application Security Engineer Boston, MA · Apr 2020 - Present
  • Own the firm-wide AppSec program across 600+ repos, supporting 1,200 engineers across 5 product lines on Java, C#, and Python.
  • Authored the firm's SDLC security standard mapping OWASP ASVS L2 and L3 to internal control requirements, ratified by the CISO and Internal Audit.
  • Consolidated 4 legacy SAST tools into a curated Checkmarx + Semgrep stack, cutting tool-licensing spend by 28% and lifting developer adoption.
  • Grew the security-champions network from 18 to 60+ champions across 5 product lines, with a 9-week curriculum and quarterly recognition program.
  • Cleared PCI DSS and NYDFS 23 NYCRR 500 AppSec scope across 4 audit cycles with zero material findings.
  • Cut firm-wide MTTR on critical findings from 42 days to 9 days over 30 months through tightened SLAs and exec-level scorecards.
  • Chair the firm-wide AppSec Council, authored 140+ ADRs and standards, mentored 6 engineers to Senior and 2 to Staff.
John Hancock Financial Senior Application Security Engineer Boston, MA · Jul 2014 - Mar 2020
  • Senior AppSec engineer for the firm's policy-administration platform, owning code review and threat modeling across 120 Java services.
  • Built the team's Veracode-to-Checkmarx migration, cutting scan times by ~55% and lifting developer adoption.
  • Cleared SOC 2 Type II AppSec scope across 4 audit cycles; partnered with Compliance on FFIEC examinations.
  • Authored 22 secure-coding standards adopted across 6 product teams.
  • Mentored 5 mid-career engineers toward senior AppSec roles.

Filled the template? Get a recruiter's eyes on it.

The template gives you a recruiter-vetted skeleton. The next step is making sure your specific repos, findings, and MTTR metrics hold up under a 6-second screen.

Free, personally reviewed within 12 hours by a former Google recruiter.

Get a Free Resume Review today

I review personally all resumes within 12 hrs

PDF, DOC, or DOCX · under 5MB

Frequently asked

Your Questions about the Application Security Engineer Resume Template, Answered

Yes, fully free. No signup, no email gate, no premium tier underneath. Open the template, drop in your details, save the PDF, you are done.

Yes. The exported PDF is single-column with the section headers an ATS parses by default (Profile Summary, Technical Skills, Education, Work Experience), no tables, no images, no multi-column layouts. Workday, Greenhouse, iCIMS, and the security-engineering ATS portals (SmartRecruiters, Lever) handle it cleanly. Drop the export into our ATS Checker after if you want a second look.

You can. Toggle Edit at the top of the resume preview, then click into any sentence and rewrite it directly. The side-panel placeholders keep cascading; the rest of the text is plain editable copy.

Click Download. Your browser builds the PDF on the spot, no print dialog, no signup, no server in the loop. The output is real vector text on US Letter, parsed by an ATS the same way it parses any clean resume export.

Yes. The bullet skeletons assume the AppSec posture: you review code, run threat models, tune SAST/DAST/SCA, triage bug bounty reports, and partner with engineers rather than ship features. The language picks (Java, Python, etc.) describe what you review, not what you ship. If you do contribute hardened libraries or pave-the-road tooling, the developer-enablement bullets cover that explicitly.

Application Security Engineer leans toward code- and design-level security: threat modeling, secure code review, SAST/DAST/SCA tuning, OWASP Top 10 / ASVS expertise, API security, auth and crypto guidance, bug bounty management, and developer enablement. The Security Engineer template stays broader on endpoint, identity, and detection engineering. The DevSecOps Engineer template leans more on pipeline plumbing (Jenkins/GitLab CI, container scanning, runtime policy). If your day is sitting in design reviews, reading PRs for IDOR, triaging Snyk findings, and running the bug bounty queue, pick this one.

No. AppSec hiring panels and CISOs screen on substance: the design reviews you sat in, the vulnerability classes you eliminated, the SAST queue you actually drove down, the bug bounty MTTR you cut, the champions network you built. Layout origin is not on the rubric. What does cost interviews is a resume padded with vague AppSec buzzwords, which this template is structured to prevent. The skeleton came from a former Google recruiter; the substance is yours.

Why trust this template

Emmanuel Gendre, former Google recruiter and tech resume writer

Emmanuel Gendre

Former Google recruiter · Tech resume writer

I built this Application Security Engineer template from the patterns I saw work, not from generic advice. Below is the data behind every bullet, skills line, and metric placeholder.

  • Experience Hundreds of AppSec Engineer resumes screened across consumer SaaS, fintech, healthcare, and Fortune-500 financial services during my Google recruiter years and at TechieCV. The Profile Summary and Skills sections mirror what survived the 6-second screen at the senior AppSec and AppSec-lead level.
  • Expertise Bullets modeled on senior offers. The Dropbox section is structured the way Senior AppSec Engineers write their experience when they land tier-one AppSec interviews: SDLC ownership at scale, threat modeling with cadence numbers, secure code review with vulnerability-class reduction, SAST/SCA tuning with false-positive rate, OWASP ASVS coverage with audit-window timing, API security with broken-auth retirement, and bug bounty triage with MTTR cuts.
  • Trust Stack reflects the 2026 hiring bar. Java + Python review, Semgrep + SonarQube SAST, Burp + OWASP ZAP DAST, Snyk + Dependabot SCA, HackerOne for bug bounty, OWASP ASVS for control mapping is what hiring managers expect today; suggestion chips cover realistic alternatives (Go, TypeScript, C#, CodeQL, Checkmarx, Veracode, Mend, OWASP SAMM, NIST SSDF) so you can match your real toolchain without losing keyword fit.
Read my full story →

Next steps

Sharpen the surrounding pieces of your resume.

The template builds the skeleton. These pages cover the long-form walkthrough and the second-pair-of-eyes check.

Coming soon

AppSec Engineer resume skills

The full list of ATS keywords, frameworks, and tooling that show up on every AppSec Engineer JD, sorted by category and seniority band. Currently being written.

Coming soon

Coming soon

How to write an AppSec Engineer resume

A full walkthrough: structure, Profile Summary copy, Work Experience bullets, and surviving the CISO-staff screen. Currently being written.

Coming soon

Verify it

ATS Checker

Drop in your exported PDF to see which keywords parse cleanly, which ones the ATS drops, and where the structure trips up the reader. Free, runs in your browser.

Run the check →

Disclaimer. This template is a starting point. Defaults are illustrative; replace every metric and tool with values that reflect your real work. Tailor wording to each job description.