Staff Application Security Engineer

Staff Application Security Engineer

Full-Time No home office possible
C

At a Glance

  • Tasks: Lead the creation of our application security program and protect our digital assets.
  • Company: Join a forward-thinking tech company with a focus on innovation and security.
  • Benefits: Enjoy competitive salary, equity, unlimited PTO, and health benefits.
  • Other info: Be part of a diverse team that values creativity and collaboration.
  • Why this job: Make a real impact in securing cutting-edge applications and infrastructure.
  • Qualifications: 7+ years in application security and hands-on experience with SAST/DAST tools.

About the Role: Our engineering organization is growing, and with that growth comes an expanding application and infrastructure footprint that requires dedicated application security ownership. This role exists to build that function from the ground up. As our first dedicated Staff Application Security Engineer, you will own the design and implementation of our application security program, from SAST and DAST tooling to secure SDLC practices, threat modeling, dependency security, and penetration testing coordination. You will work directly with engineering teams across a cloud‑based environment securing both customer‑facing products and internal systems. You will be reporting directly to the Head of Security and will have the autonomy and organizational support to build an application security program that is practical, scalable, and aligned to the risk profile of a company operating in the digital asset space.

Primary Responsibilities:

  • Static & Dynamic Application Security Testing (SAST / DAST)
  • Own the full implementation of SAST tooling across all codebases and CI/CD pipelines
  • Own the full implementation of DAST tooling across all customer‑facing and internal applications
  • Establish baseline findings, prioritize remediation, and work directly with engineering to resolve issues
  • Maintain and tune tooling over time as the codebase and attack surface evolve
  • Secure SDLC & Code Integrity
  • Define and enforce a secure software development lifecycle across engineering teams
  • Establish secure release processes including code signing and build integrity verification
  • Develop and maintain security standards, guidelines, and secure coding practices
  • Integrate security checkpoints throughout the development pipeline without creating unnecessary friction for engineering
  • Threat Modeling
  • Lead threat modeling exercises for new infrastructure designs, features, and system changes
  • Ensure all customer‑facing and internal applications are fully documented and threat modeled
  • Maintain a living inventory of the company's attack surface and ensure it reflects current architecture
  • Dependency & Supply Chain Security
  • Implement and manage dependency scanning across all projects
  • Enforce version pinning policies to reduce exposure from uncontrolled dependency updates
  • Deploy and manage supply chain security tooling (e.g., Socket.dev or equivalent) to monitor for malicious or compromised dependencies
  • Establish a process for ongoing dependency review and remediation
  • Penetration Testing
  • Define and maintain a penetration testing program covering all surface areas — applications, APIs, internal tooling, and infrastructure
  • Scope, schedule, and manage third‑party penetration testing engagements
  • Track findings through to remediation and validate fixes
  • Secrets Management
  • Design and implement a secrets management program across cloud infrastructure and engineering workflows
  • Eliminate hardcoded credentials and secrets from codebases
  • Establish policies and tooling for secrets rotation, access control, and audit logging
  • Fuzzing & Attack Surface Coverage
  • Implement fuzz testing across applicable components, particularly APIs and input‑handling logic
  • Ensure coverage gaps in the attack surface are identified, documented, and addressed systematically

Role Requirements:

  • 7+ years of experience in application security or a closely related discipline
  • Demonstrated experience building or significantly maturing an application security program
  • Deep hands‑on experience with SAST and DAST tooling implementation and management
  • Strong knowledge of secure SDLC practices and CI/CD pipeline security integration
  • Experience with dependency scanning and software supply chain security
  • Proficiency in threat modeling methodologies (STRIDE, PASTA, or equivalent)
  • Experience managing or coordinating third‑party penetration testing engagements
  • Solid understanding of secrets management solutions (e.g., HashiCorp Vault, AWS Secrets Manager, or equivalent)
  • Strong written and verbal communication skills — able to document findings and present risk clearly to both technical and non‑technical audiences

What We Offer:

  • Compensation: $185,000 to $260,000 + Equity
  • Equity compensation as a component of all offers
  • Health insurance, including dental and vision plans
  • Health, Dependent Care and Commuter Flexible Spending Accounts
  • Paid Parental Leave
  • Life insurance; short‑ and long‑term disability plans
  • Company‑funded 401(k) plan, no matching required
  • Unlimited PTO
  • 10 paid company‑wide holidays
  • Company‑wide winter break for most roles
  • Office spaces in San Francisco, New York, and London
  • Meals and snacks provided in office
  • Paid company cell phone or stipend
  • Bitwise “Buddy” Program (30‑day new‑hire success program)
  • Annual anniversary gifts
  • Company‑wide events including annual holiday party
  • Internal Women of Bitwise (WOB) group with fun events

Our Values:

  • Create 'a ha' moments
  • Move fast, with informed rationale
  • Ask "What would the client want?"
  • Show gratitude

Your Interview Process:

  • Recruiter Interview
  • Hiring Manager Interview
  • Work Sample
  • Meeting the Team
  • Executive/Founders Interview
  • References
  • Offer!

Bitwise is an equal opportunity employer. We are committed to building a team of people with a variety of backgrounds, perspectives, and skills. It is the policy of Bitwise to ensure equal opportunity. All candidates are considered without regard to race, color, religion, national origin, age, sex, sexual orientation, gender identity, marital status, ancestry, physical or mental disability, veteran status, or any other legally protected characteristics. Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. Please note that we do not sponsor visas for persons without work authorization in the United States. This role is for full‑time employees only (no B2B or contractors). Thank you!

Staff Application Security Engineer employer: Castleisland

At Bitwise, we pride ourselves on being an exceptional employer, particularly for our Staff Application Security Engineer role. With a strong focus on employee growth and a supportive work culture, we offer competitive compensation, unlimited PTO, and a range of health benefits, all within a dynamic environment that encourages innovation and collaboration. Our commitment to diversity and inclusion, along with unique initiatives like the Bitwise 'Buddy' Program and company-wide events, ensures that every team member feels valued and empowered to contribute meaningfully to our mission in the digital asset space.

C

Contact Detail:

Castleisland Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Staff Application Security Engineer

Tip Number 1

Network like a pro! Reach out to folks in the industry, attend meetups, and connect with potential colleagues on LinkedIn. You never know who might have the inside scoop on job openings or can put in a good word for you.

Tip Number 2

Prepare for those interviews by practising common questions and scenarios related to application security. We recommend doing mock interviews with friends or using online platforms to get comfortable with articulating your experience and skills.

Tip Number 3

Showcase your expertise! Create a portfolio or GitHub repository that highlights your projects, especially those involving SAST, DAST, and secure SDLC practices. This gives you a tangible way to demonstrate your skills to potential employers.

Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!

We think you need these skills to ace Staff Application Security Engineer

Static Application Security Testing (SAST)
Dynamic Application Security Testing (DAST)
Secure Software Development Lifecycle (SDLC)
Threat Modeling
Dependency Scanning
Software Supply Chain Security
Penetration Testing

Some tips for your application 🫡

Tailor Your Application:Make sure to customise your CV and cover letter to highlight your experience in application security. We want to see how your skills align with the role, so don’t hold back on showcasing your SAST and DAST expertise!

Showcase Your Achievements:When detailing your past roles, focus on specific achievements that demonstrate your ability to build or mature an application security program. Use metrics where possible – numbers speak volumes!

Be Clear and Concise:We appreciate clarity! Keep your writing straightforward and to the point. Avoid jargon unless it’s relevant to the role, and make sure your passion for application security shines through.

Apply Through Our Website:Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensures you’re considered for this exciting opportunity. We can’t wait to hear from you!

How to prepare for a job interview at Castleisland

Know Your Stuff

Make sure you brush up on your SAST and DAST tooling knowledge. Be ready to discuss how you've implemented these in past roles, as well as any challenges you've faced and how you overcame them. This will show that you're not just familiar with the concepts but have real-world experience.

Showcase Your Problem-Solving Skills

Prepare to talk about specific instances where you've led threat modelling exercises or managed penetration testing engagements. Use the STAR method (Situation, Task, Action, Result) to structure your answers, highlighting your ability to identify risks and implement effective solutions.

Understand the Company’s Needs

Research the company’s current application security posture and be ready to suggest improvements. This shows initiative and that you’re genuinely interested in building their application security program from the ground up. Tailor your responses to align with their values and mission.

Communicate Clearly

Since you'll need to present findings to both technical and non-technical audiences, practice explaining complex security concepts in simple terms. This will demonstrate your strong communication skills and your ability to bridge the gap between different teams.