Yusuf Demirkan
Senior AppSec Engineer · SAST + Threat Modeling · CVE-2024-XXXXX
Istanbul·[email protected]·+90 532 555 0298·github.com/ydemirkan·hackerone.com/ydemirkan·linkedin.com/in/ydemirkan
Summary
Senior AppSec engineer with seven years across two SaaS + fintech companies. Owns the SAST + threat-modeling program for 280 engineers at a Series C SaaS. Shipped 38 SAST findings to remediation through 2024 (4 P0, 12 P1, 22 P2); zero P0/P1 in production for 9 consecutive months. OWASP ASVS L2 conformance org-wide. CVE-2024-XXXXX credit (CVSS 8.2). OSCP (2023).
Skills
AppSec
Semgrep + GitHub Code ScanningBurp Suite ProSnyk + TrivySTRIDE threat modeling
Frameworks
OWASP ASVS L2 / Top 10 / SAMMMITRE ATT&CKNIST CSF + 800-53SOC2 Type II
Languages + Tooling
Python (security tooling)Go (CLI + scanners)TypeScript / JavaScriptCoordinated disclosure
Experience
Senior AppSec Engineer
Q
Quill · Remote (Istanbul, TR)
May 2022—Present
- Shipped 38 SAST findings to remediation through 2024 (4 P0, 12 P1, 22 P2); zero P0/P1 in production for 9 consecutive months post-program-launch.
- Achieved OWASP ASVS L2 conformance org-wide across 38 services; remediation pass closed 14 P0/P1 ASVS gaps in 6 weeks.
- Built the org's threat-modeling program (STRIDE-based, applied to every new service); 24 threat models completed; surfaced 38 design-time risks (8 P0 candidates) before code review.
- Migrated the SAST pipeline from Checkmarx to Semgrep + GitHub Code Scanning; SAST runtime fell from 45 min to 4 min; false-positive rate dropped from 38% to 11%.
- Mentored 2 junior security engineers from generalist SWE into AppSec focus; both shipped sole-owner program work within 6 months.
AppSec Engineer
A
Adyen · Amsterdam, NL
Aug 2019—Apr 2022
- Reduced security-team ticket queue from 480 open to 38 via automation (auto-remediation for low-severity findings + self-service threat-model intake form).
- Discovered and disclosed CVE-2024-XXXXX in a widely-used open-source library; CVSS 8.2 (High). Coordinated disclosure with maintainer over 8 weeks; patch released in 4 minor versions.
- Owned the SOC2 Type II audit prep over 8 weeks; shipped 14 control remediations; external auditor signed off with zero findings.
Security Engineer
B
Booking.com · Amsterdam, NL
Aug 2017—Jul 2019
- HackerOne reputation 1,240 (top 12% globally) — 38 confirmed reports across 2024, including 4 P0 chained-vulnerabilities at recognized B2B SaaS programs.
- Wrote the company's internal red-team playbook used quarterly across 4 product teams.
Certifications
OSCP (Offensive Security Certified Professional)
Offensive Security·Feb 2023
GIAC GWAPT (Web Application Penetration Tester)
GIAC·Sep 2021
CVE & Speaking
• CVE-2024-XXXXX — CVSS 8.2 (High), coordinated disclosure to an open-source library maintainer; patched in 4 minor versions. • DEFCON 32 (2024) speaker — 'Building threat-modeling programs that scale to 280 engineers' (45-min track talk, 4,200 views). • BSides Istanbul 2023 speaker — 'STRIDE in practice.'
Education
BSc in Computer Engineering
Boğaziçi University
Sep 2013—Jun 2017
Senior (AppSec)
7 years AppSec. Owns SAST + threat modeling for 280 engineers. 1 CVE credit.
Use this template