Skill-Profil

SAST/DAST

SonarQube, Semgrep, Snyk, OWASP ZAP: static and dynamic analysis

Security Application Security

Rollen

5

wo dieser Skill vorkommt

Stufen

5

strukturierter Entwicklungspfad

Pflichtanforderungen

23

die anderen 2 optional

Domäne

Security

skills.group

Application Security

Zuletzt aktualisiert

17.3.2026

Verwendung

Wählen Sie Ihr aktuelles Level und vergleichen Sie die Erwartungen.

Was wird auf jedem Level erwartet

Die Tabelle zeigt, wie die Tiefe von Junior bis Principal wächst.

Rolle Pflicht Beschreibung
Application Security Engineer Pflicht Understands basic SAST/DAST concepts. Follows security guidelines. Recognizes typical code vulnerabilities.
DevSecOps Engineer Pflicht Runs SonarQube and Semgrep locally for static code analysis. Studies SAST reports, classifies vulnerabilities by severity. Configures basic DAST scan with OWASP ZAP against test application. Understands difference between SAST, DAST and IAST approaches to security testing.
Penetration Testing Engineer Pflicht Understands basic SAST/DAST concepts. Follows security guidelines. Recognizes common vulnerabilities in code.
QA Security Engineer Runs SAST/DAST tools: SonarQube for static analysis, ZAP for dynamic analysis. Reads reports, classifies findings. Distinguishes true positives from false positives.
Security Analyst Pflicht Understands basic SAST/DAST concepts. Follows security guidelines. Recognizes common code vulnerabilities.
Rolle Pflicht Beschreibung
Application Security Engineer Pflicht Configures and runs SAST/DAST tools to identify vulnerabilities in application code and running services. Conducts security code reviews using static analysis findings as input. Triages scanner results, eliminates false positives, and tracks confirmed issues to resolution.
DevSecOps Engineer Pflicht Integrates SonarQube and Semgrep into CI/CD pipelines with quality gates blocking merge on critical vulnerabilities. Configures OWASP ZAP in API scanning mode with OpenAPI specification. Writes custom Semgrep rules for project-specific vulnerability patterns.
Penetration Testing Engineer Pflicht Uses DAST tools alongside manual penetration testing to discover runtime vulnerabilities. Validates SAST findings through exploitation to confirm real attack vectors. Integrates dynamic scanning into penetration testing workflows to maximize coverage of web application attack surfaces.
QA Security Engineer Configures SAST/DAST pipeline: Semgrep/SonarQube rules customization, ZAP automated scan profiles, IAST integration. Tunes rules to reduce false positives. Prioritizes findings.
Security Analyst Pflicht Analyzes SAST/DAST scan results to assess risk levels and prioritize remediation efforts. Correlates scanner findings with threat intelligence and known vulnerability databases. Generates actionable security reports from scanning data for development and management teams.
Rolle Pflicht Beschreibung
Application Security Engineer Pflicht Designs security solutions with SAST/DAST. Conducts threat modeling. Implements security practices in SDLC. Mentors the team.
DevSecOps Engineer Pflicht Develops centralized SAST/DAST platform for all teams. Tunes SonarQube quality profiles, minimizing false positives to less than 10%. Introduces IAST (Contrast Security) for runtime analysis. Configures SAST and DAST result correlation for vulnerability prioritization.
Penetration Testing Engineer Pflicht Designs advanced SAST/DAST testing strategies combining automated scanning with manual exploitation techniques. Conducts threat modeling to identify gaps in scanner coverage. Integrates SAST/DAST into CI/CD security gates with custom rule sets. Mentors team on interpreting and validating scanner results.
QA Security Engineer Pflicht Designs SAST/DAST strategy: tool selection by technology stack, custom rules for business logic, finding correlation between SAST and DAST. Creates custom Semgrep/CodeQL rules.
Security Analyst Pflicht Designs comprehensive SAST/DAST analytics frameworks for vulnerability trend analysis. Conducts threat modeling to map scanner coverage against real attack scenarios. Integrates scanning results into SIEM for continuous security monitoring. Mentors analysts on vulnerability classification and risk scoring.
Rolle Pflicht Beschreibung
Application Security Engineer Pflicht Defines organization-wide SAST/DAST strategy and tool selection standards. Establishes security scanning policies, quality gates, and remediation SLAs for development teams. Coordinates vulnerability response across products when critical scanner findings arise. Trains engineers on effective SAST/DAST adoption.
DevSecOps Engineer Pflicht Defines AST (Application Security Testing) strategy with SonarQube Enterprise, Semgrep Pro, OWASP ZAP and Burp Suite. Manages AppSec engineering team. Builds SAST/DAST effectiveness metrics: detection time, false positive rate, coverage. Integrates results into Defect Dojo.
Penetration Testing Engineer Pflicht Defines SAST/DAST integration strategy for penetration testing across all products. Establishes scanner validation policies and custom rule development standards. Coordinates offensive security efforts combining automated scanning with manual testing. Trains pentest engineers on advanced SAST/DAST usage.
QA Security Engineer Pflicht Defines SAST/DAST standards: mandatory scanning gates, triage process, remediation SLA. Coordinates tooling between security and development. Evaluates tool effectiveness.
Security Analyst Pflicht Defines SAST/DAST monitoring and reporting strategy across the organization. Establishes vulnerability management policies based on scanner data and risk classification. Coordinates cross-team remediation tracking for critical scanner findings. Trains security analysts on scan result analysis and prioritization.
Rolle Pflicht Beschreibung
Application Security Engineer Pflicht Defines enterprise SAST/DAST security testing architecture spanning all development platforms. Shapes scanning strategy for multi-cloud and microservice environments at scale. Coordinates with vendors on tool capabilities and compliance requirements. Drives SAST/DAST best practices adoption across the industry.
DevSecOps Engineer Pflicht Designs corporate security testing architecture unifying SAST, DAST, IAST, SCA and fuzzing into a single pipeline. Defines standards for dozens of teams. Evaluates and introduces innovative approaches: AI-driven SAST, semantic code analysis, runtime protection.
Penetration Testing Engineer Pflicht Defines enterprise offensive security strategy integrating SAST/DAST with manual penetration testing at scale. Shapes security testing architecture for complex distributed systems. Coordinates with tool vendors and regulatory bodies on scanning standards. Represents the organization in offensive security community.
QA Security Engineer Pflicht Designs application security testing platform: integrated SAST/DAST/IAST/SCA, automated triage, vulnerability correlation. Defines organizational AppSec testing strategy.
Security Analyst Pflicht Defines enterprise vulnerability intelligence strategy powered by SAST/DAST data across all business units. Shapes security analytics architecture integrating scanner output with threat intelligence platforms. Coordinates compliance reporting with regulatory bodies. Drives vulnerability management standards in the industry.

Community

👁 Beobachten ✏️ Aenderung vorschlagen Anmelden, um Aenderungen vorzuschlagen
📋 Vorschlaege
Noch keine Vorschlaege fuer SAST/DAST
Kommentare werden geladen...