ATS-TestedFree + edit in builder

Security engineer resume examples

Full-length security engineer resumes across AppSec, detection engineering, and incident response. Each leads with the security domain owned, names CVE / detection / remediation work in real units, and surfaces the framework fluency hiring panels grade on.

ByTomás Albrecht·Senior Resume Writer·Reviewed byDaniel Ortega· Head of Writing·1 example

Security engineer hiring grades on three axes: domain (AppSec, DetEng, IR, GRC, Red Team), evidence (findings, detections, incidents — with counts and outcomes), and framework fluency (OWASP, MITRE ATT&CK, NIST CSF, CIS, ISO 27001). The resumes on this page are written for those axes. Bullets name the domain, attach counts with severity, and reference at least one framework explicitly.

This matters because security hiring is the most domain-specific of the engineering disciplines. An AppSec engineer who claims DetEng expertise invites scrutiny; a DetEng engineer who claims pen-testing expertise invites the same. Senior security hiring panels prefer depth in one domain to breadth across all five. The 2026 trend is increasing domain specialization, not less.

For entry-level candidates, the structure is identical with smaller scope. A CTF team that has placed in named competitions (Plaid, Pwn2Own, DEFCON quals), a public bug-bounty profile with confirmed reports, or a substantive open-source security tool is high-leverage. Certifications matter more at entry-level — OSCP for pen-testing track, eJPT for early career, CompTIA Security+ for compliance.

For senior and staff candidates, the structure widens. The summary names the domain and the program scope. The experience bullets quantify findings, detections, or incidents with severity. The bottom third reserves space for capability proof — CVE credits, conference talks at DEFCON / BlackHat / BSides, published research, or open-source security tools with adoption.

The example

Yusuf Demirkan

Senior AppSec Engineer · SAST + Threat Modeling · CVE-2024-XXXXX
Istanbul·[email protected]·+90 532 555 0298·github.com/ydemirkan·hackerone.com/ydemirkan·linkedin.com/in/ydemirkan

Summary

Senior AppSec engineer with seven years across two SaaS + fintech companies. Owns the SAST + threat-modeling program for 280 engineers at a Series C SaaS. Shipped 38 SAST findings to remediation through 2024 (4 P0, 12 P1, 22 P2); zero P0/P1 in production for 9 consecutive months. OWASP ASVS L2 conformance org-wide. CVE-2024-XXXXX credit (CVSS 8.2). OSCP (2023).

Skills

AppSec
Semgrep + GitHub Code ScanningBurp Suite ProSnyk + TrivySTRIDE threat modeling
Frameworks
OWASP ASVS L2 / Top 10 / SAMMMITRE ATT&CKNIST CSF + 800-53SOC2 Type II
Languages + Tooling
Python (security tooling)Go (CLI + scanners)TypeScript / JavaScriptCoordinated disclosure

Experience

Senior AppSec Engineer
Quill · Remote (Istanbul, TR)
May 2022Present
  • Shipped 38 SAST findings to remediation through 2024 (4 P0, 12 P1, 22 P2); zero P0/P1 in production for 9 consecutive months post-program-launch.
  • Achieved OWASP ASVS L2 conformance org-wide across 38 services; remediation pass closed 14 P0/P1 ASVS gaps in 6 weeks.
  • Built the org's threat-modeling program (STRIDE-based, applied to every new service); 24 threat models completed; surfaced 38 design-time risks (8 P0 candidates) before code review.
  • Migrated the SAST pipeline from Checkmarx to Semgrep + GitHub Code Scanning; SAST runtime fell from 45 min to 4 min; false-positive rate dropped from 38% to 11%.
  • Mentored 2 junior security engineers from generalist SWE into AppSec focus; both shipped sole-owner program work within 6 months.
AppSec Engineer
Adyen · Amsterdam, NL
Aug 2019Apr 2022
  • Reduced security-team ticket queue from 480 open to 38 via automation (auto-remediation for low-severity findings + self-service threat-model intake form).
  • Discovered and disclosed CVE-2024-XXXXX in a widely-used open-source library; CVSS 8.2 (High). Coordinated disclosure with maintainer over 8 weeks; patch released in 4 minor versions.
  • Owned the SOC2 Type II audit prep over 8 weeks; shipped 14 control remediations; external auditor signed off with zero findings.
Security Engineer
Booking.com · Amsterdam, NL
Aug 2017Jul 2019
  • HackerOne reputation 1,240 (top 12% globally) — 38 confirmed reports across 2024, including 4 P0 chained-vulnerabilities at recognized B2B SaaS programs.
  • Wrote the company's internal red-team playbook used quarterly across 4 product teams.

Certifications

OSCP (Offensive Security Certified Professional)
Offensive Security·Feb 2023
GIAC GWAPT (Web Application Penetration Tester)
GIAC·Sep 2021

CVE & Speaking

• CVE-2024-XXXXX — CVSS 8.2 (High), coordinated disclosure to an open-source library maintainer; patched in 4 minor versions. • DEFCON 32 (2024) speaker — 'Building threat-modeling programs that scale to 280 engineers' (45-min track talk, 4,200 views). • BSides Istanbul 2023 speaker — 'STRIDE in practice.'

Education

BSc in Computer Engineering
Boğaziçi University
Sep 2013Jun 2017
senior

Senior (AppSec)

7 years AppSec. Owns SAST + threat modeling for 280 engineers. 1 CVE credit.

Use this template

Live preview · Senior (AppSec)

Use this resume

Why this resume works

Summary opens with domain (AppSec) + program scope. Bullets quantify findings with severity, OWASP standard, framework fluency. CVE credit closes as the gold-standard credential. OSCP certification with year. One page tight.

Yusuf Demirkan

Senior AppSec Engineer · SAST + Threat Modeling · CVE-2024-XXXXX
Istanbul·[email protected]·+90 532 555 0298·github.com/ydemirkan·hackerone.com/ydemirkan·linkedin.com/in/ydemirkan

Summary

Senior AppSec engineer with seven years across two SaaS + fintech companies. Owns the SAST + threat-modeling program for 280 engineers at a Series C SaaS. Shipped 38 SAST findings to remediation through 2024 (4 P0, 12 P1, 22 P2); zero P0/P1 in production for 9 consecutive months. OWASP ASVS L2 conformance org-wide. CVE-2024-XXXXX credit (CVSS 8.2). OSCP (2023).

Skills

AppSec
Semgrep + GitHub Code ScanningBurp Suite ProSnyk + TrivySTRIDE threat modeling
Frameworks
OWASP ASVS L2 / Top 10 / SAMMMITRE ATT&CKNIST CSF + 800-53SOC2 Type II
Languages + Tooling
Python (security tooling)Go (CLI + scanners)TypeScript / JavaScriptCoordinated disclosure

Experience

Senior AppSec Engineer
Quill · Remote (Istanbul, TR)
May 2022Present
  • Shipped 38 SAST findings to remediation through 2024 (4 P0, 12 P1, 22 P2); zero P0/P1 in production for 9 consecutive months post-program-launch.
  • Achieved OWASP ASVS L2 conformance org-wide across 38 services; remediation pass closed 14 P0/P1 ASVS gaps in 6 weeks.
  • Built the org's threat-modeling program (STRIDE-based, applied to every new service); 24 threat models completed; surfaced 38 design-time risks (8 P0 candidates) before code review.
  • Migrated the SAST pipeline from Checkmarx to Semgrep + GitHub Code Scanning; SAST runtime fell from 45 min to 4 min; false-positive rate dropped from 38% to 11%.
  • Mentored 2 junior security engineers from generalist SWE into AppSec focus; both shipped sole-owner program work within 6 months.
AppSec Engineer
Adyen · Amsterdam, NL
Aug 2019Apr 2022
  • Reduced security-team ticket queue from 480 open to 38 via automation (auto-remediation for low-severity findings + self-service threat-model intake form).
  • Discovered and disclosed CVE-2024-XXXXX in a widely-used open-source library; CVSS 8.2 (High). Coordinated disclosure with maintainer over 8 weeks; patch released in 4 minor versions.
  • Owned the SOC2 Type II audit prep over 8 weeks; shipped 14 control remediations; external auditor signed off with zero findings.
Security Engineer
Booking.com · Amsterdam, NL
Aug 2017Jul 2019
  • HackerOne reputation 1,240 (top 12% globally) — 38 confirmed reports across 2024, including 4 P0 chained-vulnerabilities at recognized B2B SaaS programs.
  • Wrote the company's internal red-team playbook used quarterly across 4 product teams.

Certifications

OSCP (Offensive Security Certified Professional)
Offensive Security·Feb 2023
GIAC GWAPT (Web Application Penetration Tester)
GIAC·Sep 2021

CVE & Speaking

• CVE-2024-XXXXX — CVSS 8.2 (High), coordinated disclosure to an open-source library maintainer; patched in 4 minor versions. • DEFCON 32 (2024) speaker — 'Building threat-modeling programs that scale to 280 engineers' (45-min track talk, 4,200 views). • BSides Istanbul 2023 speaker — 'STRIDE in practice.'

Education

BSc in Computer Engineering
Boğaziçi University
Sep 2013Jun 2017

What hiring managers look for

The specific signals an experienced security engineer hiring panel grades on during the eight-second scan.

  • Summary names the security domain (AppSec, DetEng, IR)

    'AppSec engineer owns the SAST + threat-modeling program' beats 'security engineer.' The domain is the role-fit signal.

  • Specific framework named (OWASP, MITRE ATT&CK)

    OWASP ASVS, MITRE ATT&CK matrix references, NIST CSF mapping. Framework fluency is the senior signal.

  • CVE / finding / detection counts

    Vulnerabilities found, P0/P1/P2 breakdown, detections shipped, true-positive rate. Security work is graded in counts and outcomes.

  • One specific tool stack

    Burp Suite Pro, Semgrep, Snyk, Splunk, Datadog Security, KQL. Generic 'security tools' parses as junior.

  • Bug-bounty or CVE credit (if any)

    Public CVE credit, HackerOne reputation, advisory disclosure. The highest-signal AppSec credential.

  • One certification (if applicable)

    OSCP, GIAC GPEN/GWAPT, CISSP for senior. Security is one of the few fields where certifications meaningfully parse.

How to write a security engineer resume

  1. 1

    Open with the security domain and the program scope

    A senior security summary names the domain and scope: 'AppSec engineer at a Series C fintech; owns the SAST + threat-modeling program for 280 engineers.' DetEng: 'DetEng on the security team; owns 38 detections across the Microsoft 365 + AWS attack surface; 92% TP rate over Q3.' IR: 'IR lead at a fintech; ran 8 incidents through 2024 (2 IR-1, 6 IR-2); mean containment 38m.'

    Lead with the domain. Security is sub-specialized; pretending otherwise reads as junior.

  2. 2

    Quantify with severity and outcome window

    Finding counts with severity breakdown, detection counts with TP rate, IR counts with mean containment, CVE credits with CVSS, audit findings closed. Security work is graded on counts AND outcome windows — 'zero P0 incidents for 9 months' is the kind of bullet that pulls forward.

  3. 3

    Reference at least one framework

    OWASP ASVS, MITRE ATT&CK, NIST CSF, CIS Controls. Mapping work to a framework signals depth. 'Authored detections mapped to MITRE ATT&CK T1059, T1078' parses much better than 'wrote SOC detections.'

  4. 4

    Name the tool stack precisely

    Burp Pro, Semgrep, Snyk, Wiz, Splunk ES, KQL, Sigma. Specific products parse as separate tokens. Security JDs explicitly screen for the tools the company uses.

  5. 5

    Close with CVE / disclosure / community

    Public CVE credit is the gold-standard security credential. Bug-bounty reputation (HackerOne / Bugcrowd profile, confirmed reports), DEFCON / BlackHat talks, published research, open-source security tools — all are high-signal closing items.

Pro tip

Name the domain in the summary

AppSec, DetEng, IR, GRC, Red Team, Blue Team — security is sub-specialized. Naming the domain reads as senior; 'security engineer' reads as recruiter-keyword.

Pro tip

CVE numbers compound

A public CVE credit is the highest-signal security credential. Name the CVE ID, the affected software, and the severity. Even one CVE pulls a resume forward.

Pro tip

MITRE ATT&CK references signal DetEng depth

'Authored 14 detections mapped to MITRE ATT&CK T1059, T1078, T1133' parses as detection-engineering fluency. Mapping work to ATT&CK is the senior pattern.

Pro tip

True-positive rate matters more than detection count

Shipping 100 detections that page on noise burns trust. '14 detections, 92% TP rate over Q3' is the bullet that proves the work landed.

ATS notes

Security engineer ATS pipelines screen heavily for domain + tool + framework tokens. Domain tokens: AppSec, application security, DAST, SAST, IAST, RASP, DetEng, detection engineering, IR, incident response, threat hunting, threat modeling, GRC, governance risk compliance, red team, blue team, purple team, pen testing.

Framework tokens: OWASP (ASVS, Top 10, SAMM), MITRE ATT&CK, NIST CSF, NIST 800-53, CIS Controls, ISO 27001, SOC2, PCI DSS, HIPAA, FedRAMP.

Tool tokens: Burp Suite Pro, Semgrep, Snyk, Veracode, Checkmarx, Trivy, Wiz, CrowdStrike, SentinelOne, Splunk ES, Splunk SOAR, Datadog Security, Microsoft Sentinel, Chronicle, KQL, Sigma, YARA.

Name the tokens precisely. Generic 'security tools' parses as junior.

Sample bullets you can adapt

Each follows the [verb] [object] [number] structure hiring managers grade against. Copy them as a starting point, swap in your own numbers, and read the annotation to understand why each one works.

  • AppSec

    Shipped 38 SAST findings to remediation through 2024 (4 P0, 12 P1, 22 P2); zero P0/P1 in production for 9 consecutive months post-program-launch.

    Why it works: Count, severity breakdown, and sustained zero-P0 window. Vuln work graded on outcome, not just findings.

  • Detection engineering

    Authored 22 KQL detections mapped to MITRE ATT&CK T1059, T1078, T1133, T1212; 92% true-positive rate across Q3 2024 over Microsoft 365 + AWS CloudTrail.

    Why it works: Detection count, MITRE mapping, TP rate with timeframe, attack-surface scope.

  • Incident response

    Led IR on 8 incidents through 2024 (2 IR-1, 6 IR-2); mean containment time fell from 4h to 38m after the playbook rewrite I authored.

    Why it works: IR count, severity, mean containment improvement, playbook outcome.

  • CVE / disclosure

    Discovered and disclosed CVE-2024-XXXXX in a widely-used open-source library; CVSS 8.2 (High). Coordinated disclosure with maintainer over 8 weeks; patch released in 4 minor versions.

    Why it works: Named CVE, severity, coordinated-disclosure detail, and patch outcome. CVE credit is the gold-standard security credential.

  • Standards

    Achieved OWASP ASVS L2 conformance org-wide across 38 services; remediation pass closed 14 P0/P1 ASVS gaps in 6 weeks.

    Why it works: Names ASVS level, service scope, remediation count with severity, and the timeframe.

  • Threat modeling

    Built the org's threat-modeling program (STRIDE-based, applied to every new service); 24 threat models completed through 2024; surfaced 38 design-time risks (8 P0 candidates) before code review.

    Why it works: Names the framework (STRIDE), the cadence, the threat-model count, and the risk-surfacing outcome with severity calibration.

  • Tooling

    Migrated the SAST pipeline from Checkmarx to Semgrep + GitHub Code Scanning; SAST pipeline runtime fell from 45 min to 4 min; false-positive rate dropped from 38% to 11%.

    Why it works: Named tools (Checkmarx → Semgrep + Code Scanning), runtime delta, FP-rate delta. Tooling migrations with measurable outcomes are senior signal.

  • Mentorship

    Mentored 2 junior security engineers from generalist SWE into AppSec focus; both shipped sole-owner program work (one SAST, one threat-modeling) within 6 months.

    Why it works: Names the transition, the timeframe, and the deliverable per mentee.

  • Automation

    Reduced security-team ticket queue from 480 open to 38 via automation (auto-remediation for low-severity findings + a self-service threat-model intake form).

    Why it works: Names the queue depth before/after and the two automation interventions. Security automation with a queue-depth outcome is a senior signal.

  • Bug bounty

    HackerOne reputation 1,240 (top 12% globally); 38 confirmed reports across 2024, including 4 P0 chained-vulnerabilities at recognized B2B SaaS programs.

    Why it works: Public reputation number, top-percentile context, report count, severity. Bug-bounty work is a high-signal AppSec credential.

  • Speaking

    DEFCON 32 (2024) speaker — 'Building threat-modeling programs that scale to 280 engineers' (45-min track talk). 4,200 views on the recorded talk.

    Why it works: Named conference, talk title, length, and view count. DEFCON speaking is a senior security credential.

  • Compliance

    Owned the SOC2 Type II audit prep over 8 weeks; shipped 14 control remediations; external auditor signed off with zero findings.

    Why it works: Named framework, duration, remediation count, audit outcome. Cross-functional compliance work belongs on the security resume too.

Wrong vs Right · bullet rewrites

Same intent, two phrasings. Read why the right column lands on the keep-pile and the wrong column doesn't.

Summary opener

Wrong

Security engineer with experience in application and infrastructure security.

Right

AppSec engineer at a Series C fintech; owns the SAST + threat-modeling program for 280 engineers. Shipped 14 P0/P1 remediations across 38 services through 2024; OWASP ASVS L2 conformance achieved org-wide. OSCP (2023).

Why: Right version names the domain (AppSec), the program scope, a remediation count with severity, the OWASP standard achieved, and a current certification.

Vuln findings

Wrong

Identified and remediated security vulnerabilities.

Right

Shipped 38 SAST findings to remediation through 2024 (4 P0, 12 P1, 22 P2); zero P0/P1 in production for 9 consecutive months post-program-launch.

Why: Right version names the count, the severity breakdown, and the sustained zero-P0 window. Vuln work is graded on the outcome window, not just the count of findings.

Detection engineering

Wrong

Built security detections for the SOC.

Right

Authored 22 KQL detections mapped to MITRE ATT&CK T1059, T1078, T1133, T1212; 92% true-positive rate across Q3 2024 across the Microsoft 365 + AWS CloudTrail attack surface.

Why: Right version names detection count, MITRE mapping, true-positive rate with timeframe, and the attack surface scope.

Incident response

Wrong

Responded to security incidents.

Right

Led IR on 8 incidents through 2024 (2 IR-1, 6 IR-2); mean containment time fell from 4h to 38m after the playbook rewrite I authored. Authored 8 forensic postmortems with corrective actions tracked to closure.

Why: Right version names IR count, severity, mean containment, and the playbook outcome with postmortem follow-through.

CVE / disclosure

Wrong

Contributed to open-source security projects.

Right

Discovered and disclosed CVE-2024-XXXXX in a widely-used open-source library; CVSS 8.2 (High). Worked with maintainer on coordinated disclosure across 8 weeks; patch released in 4 minor versions.

Why: Right version names the CVE, severity, the coordinated disclosure work, and the patch outcome. CVE credit is the gold-standard security credential.

Skip the blank page

Start from the senior (appsec) example

Edit the names, the numbers, the company — yours in under a minute.

Use this template

Common mistakes (and how to fix them)

Patterns our writers see most often when reviewing security engineer resumes — each one disqualifies candidates faster than weak experience does.

  • Mistake

    Generic 'security engineer' opening without a domain.

    Fix

    Name the domain — AppSec, DetEng, IR, GRC, Red Team. Domain is the senior signal.

  • Mistake

    Claiming all security domains.

    Fix

    Senior security panels prefer depth in one domain over breadth across five.

  • Mistake

    Vuln counts without severity.

    Fix

    Break out by P0/P1/P2/P3. Severity context matters more than absolute count.

  • Mistake

    Generic 'security tools' without naming them.

    Fix

    Name Burp Pro, Semgrep, Snyk, Splunk, KQL by exact product. Security JDs screen for tool tokens.

  • Mistake

    Not naming any framework.

    Fix

    OWASP ASVS / MITRE ATT&CK / NIST CSF reference reads as senior. Framework fluency is the load-bearing signal.

  • Mistake

    Two-page resume with fewer than 8 years experience.

    Fix

    One page. Security hiring panels move fast.

  • Mistake

    Listing every certification without dates.

    Fix

    Security certs need years. List 2-4 current certs with year; cut older / lapsed ones.

  • Mistake

    Hidden white-text keyword stuffing.

    Fix

    Don't. Security companies disqualify aggressively for integrity issues.

Resume format for Security Engineers

Reverse-chronological. Header → domain + scope + cert summary → experience → certifications (with years) → CVE / disclosures / community → skills (Domain / Tools / Frameworks / Practices) → education. One page until at least eight years experience.

Salary & job outlook

Median annual salary

$124,910

Range: $66,710 to $192,720

Projected job growth

+33% from 2023 to 2033 (much faster than average)

Action verbs for security engineers

Strong verbs lead strong bullets. Replace generic openers (worked on, helped with, was responsible for) with the specific verb that matches what you actually did.

shippeddiscovereddisclosedremediatedpatchedhardenedauditedinstrumenteddetectedalertedcontainedpost-mortedtabletop-testedred-teamedpurple-teamedpen-testedfuzzedthreat-modeledpolicieddocumentedmentoredled

Skills hiring managers screen for

ATS pipelines weight your Skills section as a structured list. Include 15-25 of the items below if they match your experience — not soft skills.

OWASP ASVS / Top 10 / SAMMMITRE ATT&CKNIST CSF + 800-53CIS ControlsBurp Suite ProSemgrep + GitHub Code ScanningSnykWiz / LaceworkTrivySplunk ES + SOARMicrosoft Sentinel + KQLCrowdStrike FalconSigma + YARAOSCPGIAC GPEN / GWAPTCISSPAWS Security SpecialtySTRIDE threat modelingCoordinated disclosureBug-bounty program operationPython (tooling)Go (tooling)

FAQ

Should I name the security domain in my summary?+

Yes. Security is sub-specialized — AppSec, DetEng, IR, GRC, Red Team. Senior hiring panels prefer depth in one domain to breadth across five. 'AppSec engineer' beats 'security engineer.'

Do security certifications matter?+

Yes — more than for most engineering roles. OSCP is the gold standard for pen-testing track. CISSP for senior leadership track. GIAC certs for specific domains. List certs with the year.

How do I list a CVE credit?+

Name the CVE ID, the affected software, the CVSS severity, and a one-sentence description of the vulnerability class. CVE credit is the highest-signal security credential.

Should I link my HackerOne / Bugcrowd profile?+

Yes if you have reputation. List the public reputation number and the report count. Bug-bounty reputation is publicly verifiable and high-signal.

How do I demonstrate detection-engineering work?+

Detection count + MITRE ATT&CK mapping + true-positive rate with timeframe + attack-surface scope. The combo is the senior DetEng signature.

Should I include GRC work on a technical security resume?+

Yes if you've shipped it. Cross-functional compliance work (SOC2, FedRAMP) belongs on the security resume if you led or substantially contributed.

What if I work in security at a non-tech company?+

Lead with the role and the program scope. Industries (healthcare, finance, defense) bring framework-specific signal (HIPAA, PCI, FedRAMP) that translates well to security hiring panels at tech companies.

Do I need a degree in computer science for security roles?+

No. Security hiring weights certifications, CTF performance, bug-bounty reputation, and shipped security work above academic credentials. Self-taught practitioners are common in the field.

How do I handle a transition from generalist SWE to security?+

Lead with the security work first; the SWE background is supporting context. 'Software engineer with security focus — owned the SAST program for the bank-rails service for the last 18 months' is the credible bridge.

Should I mention CTF placement?+

Yes if you've placed in named competitions (DEFCON CTF quals, Pwn2Own, Plaid CTF, Google CTF). Generic 'participated in CTFs' is filler.

Ready when you are

Start with one of these examples

Pick the variant closest to your stage. We'll drop the resume into your account fully editable — swap the names, the numbers, the company, and you have a polished starting point in under a minute.

Browse examples