About the job
Are you a seasoned Staff Application Security Engineer eager to implement innovative security solutions and uphold technical excellence? At Ivanti, you will be instrumental in shaping the future of secure digital workplaces by designing and enhancing top-tier products utilized globally. Join our vibrant, collaborative team and make a significant impact, helping organizations securely navigate the fast-paced digital landscape. Your expertise will protect countless users while fostering innovation at every level.
Why This Role Matters
As a Staff Application Security Engineer at Ivanti, your role is vital in protecting our products and users from emerging threats. Your contributions will ensure trust and resilience in our technology, enabling organizations around the world to operate securely and innovate with confidence.
What You’ll Do:
- Oversee the integration of security best practices across all stages of the software development lifecycle, guaranteeing robust protection for Ivanti's products, services, and IT assets.
- Develop innovative and scalable security tools, processes, and solutions to proactively identify, remediate, and mitigate vulnerabilities in extensive and complex codebases.
- Design secure architectures, conduct thorough threat modeling, and lead penetration testing and code reviews for both web and mobile applications to uphold the highest security standards.
- Collaborate with development, operations, and architecture teams to deeply embed security into DevOps practices and promote a culture of continuous security awareness throughout the organization.
- Lead security education initiatives by providing clear, actionable training and documentation to cross-functional teams, driving vulnerability remediation efforts with stakeholders of varying technical expertise.
- Work with global product and engineering teams, business leaders, and third-party security vendors to interpret vulnerability reports and coordinate effective security solutions and disclosure programs.
- Advise stakeholders on prioritizing vulnerabilities, enforcing secure coding standards, applying cryptographic techniques, and adopting industry-leading security protocols and compliance practices.
