At a Glance
- Tasks: Conduct security reviews of web applications and deliver detailed audit reports.
- Company: Join a forward-thinking company focused on application security and innovation.
- Benefits: Enjoy remote work flexibility and focus solely on advisory tasks.
- Why this job: Make a real-world impact while working independently on high-visibility projects.
- Qualifications: 4+ years in Application Security with strong coding knowledge and technical writing skills.
- Other info: No remediation work required; just pure security assessment.
The predicted salary is between 48000 - 84000 £ per year.
We are seeking a highly experienced Application Security Consultant to conduct a comprehensive security review of a web-based application. This is a non-invasive, review-only assignment — no remediation or code modifications are required. You’ll work independently to assess application code and related configurations, identify any security vulnerabilities, and deliver a detailed, evidence-based security audit report.
Key Responsibilities
- Perform static code analysis and security audit of a web application.
- Identify potential vulnerabilities in logic, data handling, authentication, and access control.
- Assess the application against OWASP Top 10 and other secure coding standards.
- Review third-party dependencies for known issues.
- Produce a professional security report with risk ratings, findings, and recommendations.
Required Skills & Experience
- 4+ years in Application Security, AppSec consulting, or Secure Code Review roles.
- Deep understanding of secure coding practices in web frameworks (e.g., JavaScript, Python, PHP, Node.js).
- Familiarity with tools like Snyk, Checkmarx, Veracode, or Burp Suite (passive scanning).
- Knowledge of OWASP, CWE, and general secure software development principles.
- Strong technical writing and communication skills.
- Preferred certifications: OSCP, CSSLP, GWAPT, CEH, or equivalent.
Deliverables
- One formal written report including:
- Executive summary for non-technical stakeholders.
- Technical breakdown of findings with severity and impact.
- Recommended mitigation guidance (no implementation expected).
Why Join Us?
- Remote flexibility
- No remediation work — fully focused on review and advisory
- A project with high visibility and real-world impact
- Prompt onboarding and structured communication
How to Apply
Message us directly or email with your CV, availability, and examples of previous audit/reporting work if available.
Senior Application Security Consultant employer: EVOLUTION PROJECT CONSULTING LIMITED
Contact Detail:
EVOLUTION PROJECT CONSULTING LIMITED Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Application Security Consultant
✨Tip Number 1
Familiarise yourself with the OWASP Top 10 vulnerabilities, as this role heavily focuses on assessing applications against these standards. Being able to discuss these vulnerabilities in detail during your conversations will demonstrate your expertise and understanding of application security.
✨Tip Number 2
Showcase your experience with tools like Snyk, Checkmarx, or Burp Suite. If you have used these tools in previous roles, be prepared to discuss specific instances where they helped you identify vulnerabilities, as this will highlight your practical knowledge and skills.
✨Tip Number 3
Prepare to discuss your approach to static code analysis and how you would conduct a security audit. Having a clear methodology in mind will not only impress us but also show that you can work independently and deliver thorough assessments.
✨Tip Number 4
Since strong communication skills are essential for this role, practice explaining complex security concepts in simple terms. This will help you convey your findings effectively, especially when discussing reports with non-technical stakeholders.
We think you need these skills to ace Senior Application Security Consultant
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in Application Security, particularly focusing on your roles in AppSec consulting and Secure Code Review. Emphasise your familiarity with secure coding practices and the tools mentioned in the job description.
Craft a Strong Cover Letter: Write a cover letter that specifically addresses the key responsibilities of the role. Mention your experience with static code analysis and your understanding of OWASP Top 10. This is your chance to showcase your technical writing skills.
Showcase Relevant Projects: If you have previous audit or reporting work, include examples in your application. Highlight any formal reports you've produced, especially those that include executive summaries and technical breakdowns, as this aligns with the deliverables expected in the role.
Proofread Your Application: Before submitting, carefully proofread your CV and cover letter for any errors. Ensure that your communication is clear and professional, reflecting the strong technical writing skills required for the position.
How to prepare for a job interview at EVOLUTION PROJECT CONSULTING LIMITED
✨Showcase Your Technical Expertise
Be prepared to discuss your experience with secure coding practices and the specific web frameworks mentioned in the job description. Highlight any relevant projects where you performed static code analysis or security audits.
✨Familiarise Yourself with OWASP Top 10
Since the role involves assessing applications against the OWASP Top 10, make sure you can explain each vulnerability and provide examples of how you've identified them in past roles. This will demonstrate your deep understanding of application security.
✨Prepare for Technical Writing Questions
Given that a key deliverable is a formal written report, be ready to discuss your technical writing skills. You might be asked to outline how you would structure your findings and recommendations in a clear and professional manner.
✨Discuss Tools and Methodologies
Be knowledgeable about the tools listed in the job description, such as Snyk, Checkmarx, and Burp Suite. Be ready to share your experiences using these tools and how they have helped you in previous security assessments.