Skill Profile

Secure Coding Practices

Input validation, output encoding, parameterized queries, OWASP Top 10, secure defaults

Security Application Security

Roles

65

where this skill appears

Levels

5

structured growth path

Mandatory requirements

82

the other 243 optional

Domain

Security

Group

Application Security

Last updated

3/17/2026

How to Use

Choose your current level and compare expectations. The items below show what to cover to advance to the next level.

What is Expected at Each Level

The table shows how skill depth grows from Junior to Principal. Click a row to see details.

Role Required Description
1C Developer Applies basic secure coding practices in 1C development. Checks access rights before operations, uses privileged mode consciously and minimally.
AI Product Engineer Learns secure coding principles for AI product development — input validation, escaping, secrets management. Understands risks of storing models and confidential data in open access.
Analytics Engineer Getting familiar with secure coding principles for developing analytical pipelines. Understands risks of storing credentials in code, the need for SQL parameterization, and basic protection of sensitive data.
Android Developer Follows basic secure coding practices in Android: does not log sensitive data via Log.d, uses parameterized Room queries instead of string concatenation, does not store secrets in code. Understands the difference between MODE_PRIVATE and MODE_WORLD_READABLE for files, uses Content Provider with correct permissions, validates user input before sending to the server.
Application Security Engineer Required Understands basic Secure Coding Practices concepts. Follows security guidelines. Recognizes typical code vulnerabilities.
AR/VR Developer Applies basic secure coding practices in AR/VR projects. Protects user data — position, movement, and voice chat — during network transmission.
Backend Developer (C#/.NET) Follows secure coding: doesn't hardcode secrets (User Secrets, Azure Key Vault), validates input, uses parameterized queries. Stores passwords via ASP.NET Core Identity (bcrypt).
Backend Developer (Elixir) Applies basic secure coding practices in Elixir: input validation through Ecto.Changeset, output escaping in Phoenix templates. Does not store secrets in code, uses configuration through runtime.exs and environment variables.
Backend Developer (Go) Follows secure coding practices in Go: parameterized SQL queries, input escaping, secure password handling via bcrypt (golang.org/x/crypto). Does not store secrets in code, uses environment variables via os.Getenv.
Backend Developer (Java/Kotlin) Follows secure coding practices in Java: doesn't hardcode secrets, validates all input data, uses prepared statements. Stores passwords via BCrypt/Argon2. Doesn't log sensitive information.
Backend Developer (Node.js) Follows secure coding practices: parameterized queries (Prisma/Knex), input validation (Zod), output encoding, no eval/Function. Doesn't hardcode secrets. Uses helmet.
Backend Developer (PHP) Does not trust user input: validates, sanitizes, type-checks. Uses ORM instead of raw SQL. Stores secrets in environment variables, not in code. Does not log sensitive data.
Backend Developer (Python) Required Validates input data. Doesn't store passwords in plain text (bcrypt). Uses HTTPS. Doesn't log sensitive data. Follows security checklist.
Backend Developer (Rust) Applies basic secure coding practices in Rust: using Result instead of panic, input validation through validator, integer overflow protection through checked arithmetic. Understands how Rust's ownership model prevents memory-safety vulnerabilities.
Backend Developer (Scala) Follows basic secure coding principles in Scala: doesn't store secrets in code, uses parameterized queries, handles errors through Try/Either. Applies Scala type-safe constructs to prevent runtime errors, understands least privilege principle.
BI Analyst Understands basic secure coding principles for protecting analytical scripts and data. Knows credential handling rules: no hardcoded passwords, use environment variables. Applies basic input validation when creating analytical scripts and ETL processes.
Blockchain Developer Understands basic secure coding concepts for blockchain development — input validation for contract interactions, secure key management practices, and common DApp frontend vulnerabilities. Follows security guidelines for web3 libraries and recognizes reentrancy, overflow, and access control code patterns.
Cloud Engineer Applies secure coding in cloud scripts: does not hardcode credentials, uses Secrets Manager/Parameter Store. Understands the principle of least privilege for IAM.
Compiler Engineer Knows basic secure coding principles: input validation, error handling, avoiding buffer overflow. Applies basic practices when writing compiler components.
Computer Vision Engineer Follows basic secure coding practices — input image validation, secure model storage. Does not store secrets and GPU access keys in code.
Data Analyst Follows basic secure coding practices: validates input data, uses parameterized queries, and doesn't store secrets in code. Knows main vulnerability types.
Data Engineer Applies secure coding for data: secrets management in pipeline configs, secure connections to data sources. Never hardcodes credentials.
Data Scientist Applies secure coding for DS: secrets management, secure data access. Does not hardcode credentials in notebooks.
Database Engineer / DBA Knows basic secure coding principles: avoiding SQL injection, input validation. Applies parameterized queries and least privilege when working with databases.
Desktop Developer (.NET WPF/WinUI/MAUI) Understands secure coding in C#/.NET. Uses SecureString, sanitizes input. Knows .NET Security Analyzers (CA2xxx). Avoids SQL injection through parameterized queries.
Desktop Developer (Electron/Tauri) Understands secure coding in TypeScript/Electron. Avoids XSS through sanitization. Uses crypto API for hashing. Knows Content Security Policy.
Desktop Developer (Qt/C++) Understands secure coding principles in C++/Qt. Avoids buffer overflows, uses safe string operations (QString). Knows CERT C++ Coding Standard at a basic level.
DevOps Engineer Applies secure coding for DevOps: secrets in CI/CD, secure pipeline configs, no credentials in logs. Uses secrets manager.
DevSecOps Engineer Required Studies secure coding principles: input validation, parameterized queries, proper password hashing (bcrypt/Argon2). Applies encoding for XSS prevention. Uses OWASP Secure Coding Practices Quick Reference Guide in daily development.
Embedded Developer Understands the fundamentals of Secure Coding Practices. Applies basic practices in daily work. Follows recommendations from the team and documentation.
Engineering Manager Understands the importance of secure coding and can ensure basic security guideline compliance within the team. Knows main vulnerability types and protection methods.
Flutter Developer Understands basic secure coding concepts for Flutter mobile development — secure data storage with flutter_secure_storage, certificate pinning for API communication, and input sanitization for user-facing forms. Follows security guidelines for platform-specific keychain/keystore usage and recognizes common mobile vulnerabilities.
Frontend Developer (Angular) Applies basic secure coding practices in Angular — input sanitization and CSP. Avoids using innerHTML and bypassSecurityTrust without necessity.
Frontend Developer (React) Knows main vulnerabilities in React applications: XSS, CSRF, insecure data storage. Understands React's built-in XSS protection mechanisms and basic secure coding rules.
Frontend Developer (Svelte) Follows basic secure coding practices in frontend — output escaping, safe DOM handling. Knows the main types of XSS vulnerabilities in Svelte.
Frontend Developer (Vue) Knows main frontend vulnerabilities — XSS, CSRF, clickjacking. Uses Vue built-in protection mechanisms — automatic escaping in templates, v-html only with trusted data.
Fullstack Developer Applies security for fullstack: XSS prevention, CSRF tokens, input validation on both sides. Does not hardcode credentials.
Game QA Engineer Verifies secure coding in games: tests input validation, auth flows, data encryption. Validates security requirements.
Game Server Developer Knows secure coding fundamentals — input validation, data escaping, parameterized queries. Applies these principles when processing game commands from the client.
Infrastructure Engineer Knows basic secure coding principles: input validation, secrets management. Applies these principles when writing infrastructure scripts and never hardcodes credentials.
iOS Developer Follows basic secure coding practices for iOS: validates user input, doesn't hardcode secrets in code. Uses Keychain for storing tokens and passwords instead of UserDefaults, understands HTTPS importance and doesn't disable ATS. Applies Swift's strong typing to prevent errors and doesn't log sensitive data.
IoT Engineer Understands basic secure coding concepts. Follows security guidelines. Recognizes typical code vulnerabilities.
Language Tooling Engineer Applies basic secure coding practices when developing language tools. Understands risks of processing untrusted code and validates parser input data.
LLM Engineer Applies secure coding for LLM: API key management, input sanitization. Does not hardcode credentials.
ML Engineer Knows basic secure coding principles and their application in ML development. Does not hardcode API keys to model registries, validates inference request input data.
MLOps Engineer Knows basic secure coding principles: input validation, error handling. Applies secure practices when writing scripts for ML pipelines and data processing.
NLP Engineer Applies basic secure coding practices when developing NLP services. Validates input text, protects model API keys, and ensures output data sanitization.
Penetration Testing Engineer Required Understands basic secure coding concepts from a penetration testing perspective — recognizes injection, authentication bypass, and insecure deserialization patterns in source code. Follows security guidelines for identifying exploitable code weaknesses and understands how common vulnerabilities manifest in different programming languages.
Performance Testing Engineer Knows basic secure coding principles: data validation, error handling. Applies secure practices when writing load testing scripts and processing results.
Platform Engineer Applies secure coding for platform: secrets management, RBAC configuration, secure defaults. Does not hardcode credentials in platform code.
QA Automation Engineer Understands basic secure coding principles and their impact on test code. Writes tests that verify basic input validation and correct error handling.
QA Engineer (Manual) Understands basic secure coding principles for identifying security vulnerabilities during testing. Knows credential handling rules and basic input validation principles relevant to security testing.
QA Security Engineer Understands secure coding principles: input validation, output encoding, parameterized queries. Tests code for typical vulnerabilities. Uses secure coding checklists.
React Native Developer Follows basic security practices in React Native — does not store secrets in code, uses .env for configuration. Understands the dangers of storing tokens in AsyncStorage. Uses HTTPS for all requests. Validates user input. Does not log sensitive data in production.
Release Engineer Applies basic secure coding practices when writing deployment scripts. Avoids hardcoding secrets and uses environment variables for storing confidential data.
Security Analyst Required Understands basic secure coding concepts from a security analysis perspective — recognizes injection patterns, authentication bypass indicators, and insecure data handling in application logs. Follows security guidelines for identifying vulnerability signatures in code review findings and SAST/DAST reports.
Site Reliability Engineer (SRE) Applies secure coding for SRE: never hardcodes credentials, securely manages secrets in automation. Uses vault/secrets manager in scripts.
Smart Contract Developer Understands basic secure coding concepts for Solidity/Vyper development — checks-effects-interactions pattern, integer overflow prevention with SafeMath, and access control modifier usage. Follows security guidelines from SWC registry and recognizes common smart contract vulnerability patterns.
Solutions Architect Understands secure coding for architecture: encryption, authentication, authorization patterns. Evaluates security requirements.
Systems Programmer (C/C++) Applies secure coding for systems: bounds checking, safe memory operations. Uses static analysis.
Technical Lead Applies basic secure coding practices: input validation, parameterized queries, secrets management. Understands OWASP Top 10 and common vulnerabilities.
Telecom Developer Knows basic secure coding principles and typical vulnerabilities in telecom applications. Does not hardcode credentials, validates input from SIP clients and API consumers.
Unity Developer Applies secure coding in Unity: secure network calls, input validation, obfuscation awareness.
Unreal Engine Developer Applies secure coding in Unreal: buffer overflow prevention, input validation, memory safety.
XR Unity Developer Knows basic secure coding principles for Unity XR projects. Understands risks of storing secrets in code, insecure serialization and data transmission from XR devices.
Role Required Description
1C Developer Implements comprehensive protection of 1C solutions: object-level access control, secure external connections, protection against injections in dynamic query construction.
AI Product Engineer Applies secure coding practices in AI products: API endpoint protection, prompt sanitization, secure credential handling. Implements rate limiting and authentication for ML services.
Analytics Engineer Applies secure coding practices in analytics pipelines — managing secrets through vault, parameterized queries, and PII masking. Implements audit logging for tracking access to sensitive data.
Android Developer Applies secure coding practices in Android projects: SQL injection protection via parameterized Room queries, intent injection prevention through explicit intents, deep link parameter validation. Uses Android Keystore for cryptographic keys, implements secure random via SecureRandom, configures exported=false for internal components, conducts security vulnerability reviews.
Application Security Engineer Required Applies secure coding practices in application security workflows — conducts in-depth security code reviews identifying injection, authentication, and cryptographic weaknesses. Uses SAST tools (Semgrep, CodeQL) for automated vulnerability detection and develops custom security rules for organization-specific risk patterns.
AR/VR Developer Implements secure networking in AR/VR — encrypting tracking and avatar data. Configures VR session authentication and anti-cheat protection in multiplayer.
Backend Developer (C#/.NET) Applies advanced practices: Data Protection API for encryption, SecureString, certificate-based auth. Configures CORS and CSP. Conducts security reviews.
Backend Developer (Elixir) Implements secure patterns in Elixir code: atomizing user input only through String.to_existing_atom, safe deserialization through :erlang.binary_to_term(data, [:safe]). Configures Vault through ExVault for secrets management, applies Comeonin/Bcrypt for password hashing.
Backend Developer (Go) Applies advanced secure Go coding practices: crypto/rand for token generation, constant-time comparison for secrets, secure serialization. Configures TLS in net/http servers, implements input sanitization and output encoding, applies the principle of least privilege.
Backend Developer (Java/Kotlin) Applies advanced secure coding practices: protection against deserialization attacks (ObjectInputFilter), secure random via SecureRandom, encryption via JCA/JCE. Configures Content Security Policy. Conducts security review of others' code.
Backend Developer (Node.js) Applies advanced secure coding: SSRF prevention, path traversal protection, secure file upload handling. Reviews code for security: prototype pollution, ReDoS, command injection.
Backend Developer (PHP) Applies defense in depth: validation at every layer, principle of least privilege, secure session management. Implements audit logging for critical operations. Handles errors without leaking internal details.
Backend Developer (Python) Required Applies input validation at all levels. Uses secrets management (environment variables, Vault). Implements rate limiting. Handles errors without information leakage. Encrypts sensitive data at rest.
Backend Developer (Rust) Develops secure Rust code: secret protection through secrecy crate (Secret<String>), constant-time comparisons, zeroize for memory clearing. Applies principle of least privilege through the type system, restricting operations through newtype patterns and sealed traits.
Backend Developer (Scala) Applies secure coding practices in Scala: refined types for validation, opaque types for secrets, secure logging without PII. Uses cats-effect Resource for safe resource management, implements proper error handling without leaking internal details in API responses.
BI Analyst Applies secure coding practices when developing ETL pipelines: parameterized queries, secrets management. Implements secure handling of API keys and database credentials in analytical scripts. Conducts security review of analytical code for typical vulnerabilities: injection, exposure.
Blockchain Developer Applies secure coding practices in blockchain development — conducts security code reviews of smart contracts and DApp frontend code for reentrancy, front-running, and oracle manipulation risks. Uses Slither and Mythril for automated vulnerability scanning and applies secure patterns for contract upgrade mechanisms.
Cloud Engineer Implements security best practices in cloud code: encryption at rest/transit, secrets rotation, secure Lambda configurations. Scans IaC through checkov/tfsec.
Compiler Engineer Writes secure compiler code: buffer overflow protection in the parser, safe memory handling in the optimizer, correct processing of untrusted source code.
Computer Vision Engineer Applies secure by design principles when developing CV services, including input data sanitization and model artifact protection. Uses SAST for Python/C++ code.
Data Analyst Applies secure by design principles when developing analytical modules, conducts independent code security reviews. Uses security linters and static analysis.
Data Engineer Implements security in data code: encrypted connections, secure credential storage, audit logging. Scans pipeline code for vulnerabilities.
Data Scientist Implements security: encrypted data access, secure model serving, audit logging. Scans dependencies.
Database Engineer / DBA Writes secure DBA scripts: parameterizing all queries, protecting against injection in dynamic SQL, secure credential storage, logging with sensitive data masking.
Desktop Developer (.NET WPF/WinUI/MAUI) Applies secure coding in .NET: AES encryption (System.Security.Cryptography), hashing (SHA256), certificate validation. Configures .NET analyzers for security. Uses Nullable for null safety.
Desktop Developer (Electron/Tauri) Applies secure coding: crypto for encryption, path validation for file access, IPC message validation. Configures TypeScript strict for null safety. Uses ESLint security plugins.
Desktop Developer (Qt/C++) Applies secure coding practices for C++/Qt: RAII for resources, bounds checking, safe integer arithmetic. Uses compiler warnings (-Wall -Wextra -Werror). Configures AddressSanitizer for CI.
DevOps Engineer Implements security in DevOps: signed commits, container image scanning, secure pipeline templates. Implements supply chain security.
DevSecOps Engineer Required Introduces secure coding practices in the team: Content Security Policy, CORS configuration, secure session handling. Configures pre-commit hooks with Semgrep for blocking insecure patterns. Conducts security review of pull requests. Implements SSRF and path traversal protection.
Embedded Developer Applies secure coding practices in embedded: CERT C guidelines, buffer overflow prevention, secure boot implementation. Conducts basic security code review.
Engineering Manager Implements secure coding practices into team processes, organizes security reviews and training. Ensures usage of static security analysis tools.
Flutter Developer Applies secure coding practices in Flutter mobile development — conducts security code reviews for data leakage, insecure storage, and platform channel vulnerabilities. Uses mobile security scanning tools and applies secure patterns for biometric authentication, certificate pinning, and encrypted local storage.
Frontend Developer (Angular) Implements comprehensive Angular application protection — JWT authentication, HTTP interceptors for tokens. Configures CORS, CSRF protection, and secure storage of sensitive data.
Frontend Developer (React) Applies secure coding practices in React: user input sanitization, safe handling of dangerouslySetInnerHTML, clickjacking protection. Configures CSP headers for the application.
Frontend Developer (Svelte) Applies secure-by-design principles when developing Svelte components, configures CSP and SRI. Conducts security reviews of frontend code and dependencies.
Frontend Developer (Vue) Applies secure development practices in Vue — user input sanitization, Content Security Policy, secure token storage, SSRF protection during SSR.
Fullstack Developer Implements comprehensive security: CSP headers, sanitization, parameterized queries, authentication flows. Scans dependencies.
Game QA Engineer Tests game security: SQL injection, XSS in web components, secure API usage. Automates security scanning.
Game Server Developer Implements server-side validation of all client actions — movement boundary checks, inventory transaction validation, action speed control. Prevents common game exploits.
Infrastructure Engineer Implements secure secrets management through Vault and AWS Secrets Manager in infrastructure code. Configures encryption at rest and in transit for all infrastructure components and data.
iOS Developer Implements secure practices in iOS development: on-device data encryption via CryptoKit, secure clipboard and Universal Links handling. Manages authentication sessions with secure token storage and refresh, implements session timeouts. Verifies application integrity and protects against runtime modifications.
IoT Engineer Applies secure coding practices in daily work. Conducts security code review. Uses scanning and analysis tools.
Language Tooling Engineer Implements protection against injections and overflows when processing arbitrary code in language tools. Applies the principle of least privilege for plugins and extensions.
LLM Engineer Implements LLM security: prompt sanitization, output filtering, secure API integration. Protects PII.
ML Engineer Implements secure data handling in ML pipelines: sensitive feature encryption, model access management. Applies data masking and anonymization for PII in training datasets.
MLOps Engineer Writes secure code for MLOps: input validation for inference APIs, protection against pickle deserialization attacks, secure storage of API keys and credentials for ML services.
NLP Engineer Implements comprehensive NLP pipeline protection: prompt injection prevention, model execution isolation, secure PII handling in texts. Conducts security code review.
Penetration Testing Engineer Required Applies secure coding knowledge in penetration testing — reviews source code to identify exploitation vectors, maps code weaknesses to MITRE ATT&CK techniques, and develops proof-of-concept exploits from code analysis. Uses SAST tools alongside manual code review to prioritize penetration testing targets.
Performance Testing Engineer Writes secure performance testing scripts: protecting test credentials, secure storage of load configurations, masking sensitive data in test logs and reports.
Platform Engineer Implements security in platform code: admission webhooks for policy enforcement, secure operator patterns, encrypted secrets management.
QA Automation Engineer Applies secure coding practices in test infrastructure — secure storage of test credentials, parameterized queries in test utilities, test data protection.
QA Engineer (Manual) Conducts security testing based on OWASP Top 10 with creating exploit scenarios for manual verification. Tests authorization, session management, and error handling from a security perspective. Creates comprehensive security checklists for each release and new functionality.
QA Security Engineer Verifies secure coding practices: code review for injection flaws, authentication issues, cryptographic misuse. Writes secure code examples and anti-patterns. Tests error handling.
React Native Developer Implements secure storage in React Native — Keychain (iOS) and Keystore (Android) via react-native-keychain. Integrates certificate pinning for MITM protection. Obfuscates JS bundle via Hermes bytecode. Conducts dependency security reviews with npm audit. Uses ProGuard for Android.
Release Engineer Implements secure management of secrets and certificates in release pipelines. Integrates code security checks into CI/CD and configures automated vulnerability scanning.
Security Analyst Required Applies secure coding knowledge in security event analysis — correlates SAST/DAST findings with runtime security events, identifies exploitation attempts for known code vulnerabilities, and validates security fixes in remediation workflows. Uses code analysis tools to support threat investigation and vulnerability triage.
Site Reliability Engineer (SRE) Implements security for infrastructure code: encrypted secrets, secure CI/CD pipelines, least privilege for automation. Scans IaC through security tools.
Smart Contract Developer Applies secure coding practices in smart contract development — conducts security reviews using checks-effects-interactions patterns, implements reentrancy guards and access control hierarchies, and validates economic invariants. Uses Slither, Echidna, and Foundry fuzzing for automated vulnerability detection and property-based testing.
Solutions Architect Designs secure systems: defense-in-depth, secrets management architecture, secure communication. Defines security boundaries.
Systems Programmer (C/C++) Implements system security: memory-safe patterns, secure IPC, privilege separation. Applies sanitizers.
Technical Lead Implements comprehensive security: authentication/authorization, encryption, secure headers. Conducts security code reviews and uses SAST tools.
Telecom Developer Implements secure telecom protocol handling: SIP header sanitization, buffer overflow protection in media streams. Applies TLS/SRTP for signaling and media encryption in VoIP systems.
Unity Developer Implements security: encrypted communication, server-authoritative logic, IL2CPP for obfuscation.
Unreal Engine Developer Implements security in C++: safe memory patterns, encrypted networking, secure asset delivery.
XR Unity Developer Applies secure coding practices when developing network components of XR applications: traffic encryption, server response validation. Conducts basic security audit of Unity project code.
Role Required Description
1C Developer Designs security models for 1C configurations with record-level access control. Implements user action auditing and confidential data encryption.
AI Product Engineer Designs secure AI products with data encryption, secure model storage, and audit logging. Implements automatic security checks in CI/CD and code-level adversarial attack protection.
Analytics Engineer Architects secure analytics systems with data encryption in transit and at rest, column-level masking, and row-level security. Implements automated security checks in CI/CD for dbt projects and ETL pipelines.
Android Developer Required Designs Android application security patterns: secure data storage architecture (Keystore + EncryptedFile), IPC protection through signature-level permissions, anti-debugging and anti-tampering protection. Implements code obfuscation strategy via R8 with custom dictionary, implements SSL pinning with backup pins, configures ProGuard rules for security-critical classes, conducts security code reviews.
Application Security Engineer Required Designs enterprise secure coding programs — implements security-by-design frameworks, creates organization-specific secure coding standards, and integrates automated security validation into CI/CD pipelines. Conducts architectural threat modeling and mentors development teams on writing defensive code against emerging attack vectors.
AR/VR Developer Architects AR/VR application security with biometric data protection. Develops anti-cheat systems and protection against client-side spatial data manipulation.
Backend Developer (C#/.NET) Required Designs secure-by-default: zero-trust (mTLS), secrets management via Azure Key Vault/HashiCorp Vault, audit logging via Serilog enrichers. Automates security checks in CI.
Backend Developer (Elixir) Required Designs secure Elixir application architecture. Implements least privilege principle through Guardian and RBAC authorization. Implements audit logging through :telemetry, configures data encryption through Cloak.Ecto. Conducts security code reviews focusing on OTP-specific vulnerabilities.
Backend Developer (Go) Required Designs secure Go service architecture: secrets management via HashiCorp Vault, mutual TLS for inter-service communication, audit logging. Implements static analysis via gosec with custom rules, conducts threat modeling and security code review.
Backend Developer (Java/Kotlin) Required Designs secure-by-default architecture: zero-trust between services (mTLS), secrets management via Vault, audit logging. Automates security checks: SAST, DAST, SCA in CI pipeline. Mentors on security.
Backend Developer (Node.js) Required Designs secure coding standards: ESLint security plugins (eslint-plugin-security), custom Semgrep rules for Node.js, secure code review checklist. Creates secure coding guide.
Backend Developer (PHP) Required Designs secure-by-default architecture: encrypted at rest/in transit, secrets management, automated credential rotation. Implements zero-trust approach between services. Conducts threat modeling.
Backend Developer (Python) Required Designs secure-by-default architecture. Implements defense in depth. Conducts security code audits. Configures automated security testing.
Backend Developer (Rust) Required Designs security architecture for Rust services: cryptography through ring/rustcrypto, TLS through rustls (memory-safe TLS), audit trail through structured logging. Conducts code reviews focusing on unsafe blocks, FFI boundaries and race conditions, applying MIRI for verification.
Backend Developer (Scala) Required Designs secure Scala systems: encryption at rest and in transit through Bouncy Castle, secure secret storage through Vault integration. Implements audit logging, secure session management in Play Framework, applies compile-time security checks through Scala macros and refined types.
BI Analyst Designs secure architecture for analytical systems: encryption at rest, in transit, access control. Implements security best practices for data pipelines: secrets rotation, audit logging, least privilege. Develops security guidelines for the analytics team considering data compliance.
Blockchain Developer Required Designs security solutions with Secure Coding Practices. Conducts threat modeling. Introduces security practices into SDLC. Mentors the team.
Cloud Engineer Designs secure cloud architecture: defense-in-depth, zero-trust networking, encryption key management (KMS). Introduces automated security scanning in CI/CD.
Compiler Engineer Designs secure compiler components: sandbox for macro execution, protection against DoS through exponential AST growth, formal verification of critical optimizations.
Computer Vision Engineer Implements comprehensive security practices in CV projects — model signing, secure inference, adversarial input protection. Develops guidelines for secure data handling.
Data Analyst Implements comprehensive secure coding practices in analytical projects, including threat modeling and security testing. Develops security guidelines for working with confidential data.
Data Engineer Designs secure data pipelines: end-to-end encryption, secure data transfer, compliance automation. Implements security scanning.
Data Scientist Designs secure ML: end-to-end data encryption, model access control, compliance automation.
Database Engineer / DBA Designs secure DBA tools: Vault integration for secret management, backup encryption, audit trail for all administrative operations, automated password rotation.
Desktop Developer (.NET WPF/WinUI/MAUI) Required Designs secure-by-default API for .NET components. Implements privilege separation through process isolation. Applies Code Access Security patterns. Conducts secure code review.
Desktop Developer (Electron/Tauri) Required Designs secure-by-default APIs. Implements sandboxing for untrusted content. Applies principle of least privilege. Conducts secure code review for Electron.
Desktop Developer (Qt/C++) Required Designs secure-by-default API for Qt components. Applies CFI (Control Flow Integrity) and stack protectors. Implements privilege separation in multi-process architecture. Conducts secure code review.
DevOps Engineer Designs secure DevOps: SLSA compliance, attestation chains, secure software delivery. Implements security gates in pipelines.
DevSecOps Engineer Required Develops corporate Secure Coding Guidelines for different stacks (Java, Python, Go, JS). Creates secure wrapper libraries for cryptography, authentication, sanitization. Introduces taint analysis. Conducts secure coding workshops with real vulnerability examples.
Embedded Developer Designs firmware security architecture: memory protection through MPU, privilege separation, secure state machine for authentication.
Engineering Manager Shapes secure coding strategy for multiple teams, defines standards and checklists. Integrates security testing into CI/CD and organizes regular security audits.
Flutter Developer Required Designs secure coding practices for Flutter mobile application ecosystems — implements platform-specific security hardening for iOS/Android, creates secure communication patterns with certificate transparency, and architects secure local data management with hardware-backed encryption. Conducts mobile threat modeling and mentors team on OWASP MASVS compliance.
Frontend Developer (Angular) Designs Angular application security architecture with defense in depth. Develops secure component libraries and automates static vulnerability analysis.
Frontend Developer (React) Designs security architecture for React applications: secure token management, sensitive data protection in state, audit logging. Introduces automated security scanning in CI/CD for frontend.
Frontend Developer (Svelte) Implements comprehensive secure coding practices in Svelte projects — subresource integrity, trusted types, COOP/COEP. Develops security guidelines for the frontend team.
Frontend Developer (Vue) Designs Vue application security system — strict CSP rules, subresource integrity, supply chain attack protection through lock files and dependency auditing.
Fullstack Developer Designs security architecture: end-to-end security, encryption, secure authentication. Integrates security scanning in CI.
Game QA Engineer Designs security testing: comprehensive game security testing, penetration testing, vulnerability assessment.
Game Server Developer Designs the game server security layer — server authority, cryptographic packet verification, protocol-level rate limiting. Implements WAF and DDoS protection.
Infrastructure Engineer Designs security-hardened infrastructure with least privilege, defense in depth and zero trust principles. Implements automatic IaC vulnerability scanning with tfsec, checkov and sentinel policies.
iOS Developer Required Architects secure iOS application architecture: Data Protection API for files, Secure Enclave for cryptographic keys, encrypted App Groups for inter-process communication. Implements zero-trust approach to server data, sanitizes all external data. Conducts security-focused code reviews using SAST tools for Swift.
IoT Engineer Required Designs secure coding practices for IoT and embedded systems — implements memory-safe coding patterns for firmware, secure boot chain verification, and encrypted OTA update mechanisms. Conducts threat modeling for device-cloud communication and mentors team on writing security-hardened code for resource-constrained environments.
Language Tooling Engineer Designs security models for language tools processing untrusted code. Implements sandboxes for executing macros and user analyzers with process isolation.
LLM Engineer Designs secure LLM systems: comprehensive safety pipelines, adversarial defense, compliance.
ML Engineer Designs security-hardened ML pipelines with signed model artifacts, reproducible training and audit trail. Introduces secure multi-party computation and federated learning for working with confidential data.
MLOps Engineer Architects secure ML systems: sandbox for executing user training code, model artifact tampering protection, secure multi-tenancy for shared ML infrastructure.
NLP Engineer Designs security models for NLP systems with adversarial attack protection. Implements sandbox environments for user models, data encryption, and model access auditing.
Penetration Testing Engineer Required Designs comprehensive code security assessment methodologies — identifies complex multi-step exploitation chains from source code analysis, creates custom SAST rules for organization-specific vulnerability patterns, and integrates code review findings into penetration test strategies. Conducts architecture-level threat modeling and mentors team on advanced code-level exploitation techniques.
Performance Testing Engineer Designs secure performance infrastructure: test environment isolation from production, secure handling of test data, audit trail for load tests, protection against accidental production impact.
Platform Engineer Designs secure platform: multi-tenant isolation, secure bootstrapping, supply chain security. Implements security scanning in platform CI/CD.
QA Automation Engineer Designs secure test infrastructure — test environment isolation, secrets management for CI, secure PII handling in test data, audit logging of test operations.
QA Engineer (Manual) Designs security testing strategy for the project: threat modeling, penetration test plans, risk assessment. Develops security review methodology based on attack surface and trust boundary analysis. Defines security acceptance criteria and gates for CI/CD pipeline.
QA Security Engineer Required Designs secure code review process: automated checks (Semgrep rules), manual review guidelines, secure coding standards per language. Creates secure coding training materials.
React Native Developer Required Architects React Native application security — data protection at rest and in transit, biometric authentication, jailbreak/root detection. Implements RASP (Runtime Application Self-Protection). Conducts threat modeling for mobile applications against OWASP Mobile Top 10.
Release Engineer Designs secure release systems with artifact encryption and image signing. Develops secret rotation policies and automates infrastructure code security audits.
Security Analyst Required Designs security analysis workflows integrating secure coding intelligence — correlates code-level vulnerability data with runtime threat detection, architects detection rules informed by common coding weakness patterns, and implements automated security validation workflows. Conducts threat modeling for detection engineering and mentors team on code-aware security analysis.
Site Reliability Engineer (SRE) Designs secure infrastructure automation: secrets rotation automation, secure bootstrapping, compliance-as-code. Introduces security scanning in infrastructure CI.
Smart Contract Developer Required Designs secure coding methodologies for DeFi protocol ecosystems — implements formal verification compatible patterns, creates security invariant test suites, and architects upgrade-safe contract systems with minimal attack surface. Conducts economic threat modeling and mentors team on adversarial thinking for financial contract development.
Solutions Architect Defines security architecture: zero-trust, encryption key management, security automation. Designs security infrastructure.
Systems Programmer (C/C++) Designs secure systems: capability-based security, sandboxing, verified compilation.
Technical Lead Designs security architecture: threat modeling, defense-in-depth, security testing strategy. Implements security-as-code and automated vulnerability detection.
Telecom Developer Designs security-hardened telecom components with protection against toll fraud, SIP bombing, and RTP injection. Implements automatic anomaly detection in call patterns and signaling traffic.
Unity Developer Designs secure games: comprehensive anti-cheat, secure asset delivery, vulnerability prevention.
Unreal Engine Developer Designs secure games: memory safety architecture, anti-cheat integration, vulnerability prevention.
XR Unity Developer Introduces comprehensive security approach in XR projects: anti-cheat protection in multiplayer, secure biometric data handling. Designs application security layer considering XR device specifics.
Role Required Description
1C Developer Defines secure development standards for all 1C projects in the organization. Conducts security reviews of configurations and establishes requirements for data protection and integrations.
AI Product Engineer Shapes secure coding standards for AI product teams, including ML pipeline and training data protection. Organizes regular security reviews and trains developers in defensive programming practices.
Analytics Engineer Establishes secure coding standards for the analytics team, including data classification and access control policies. Organizes security reviews of analytics pipelines and trains developers on defensive data engineering.
Android Developer Required Defines secure coding standards for the Android team: security coding guidelines, mandatory security review for auth/payment/data modules, pre-release checklists. Implements SAST tools (Detekt security rules, MobSF) in CI, conducts security training for developers, coordinates vulnerability fixes with severity-based prioritization.
Application Security Engineer Required Defines enterprise secure coding strategy across all development teams. Establishes security policies for SDLC integration, secure coding standards adoption, and automated security gate enforcement. Coordinates cross-team incident response for code-level security vulnerabilities and trains development teams on security-first coding culture.
AR/VR Developer Establishes secure coding standards for the AR/VR team. Conducts security reviews of XR components and trains on protecting spatial and biometric data privacy.
Backend Developer (C#/.NET) Required Establishes secure coding standards: security checks in PRs, approved crypto libraries, data classification. Implements security training.
Backend Developer (Elixir) Required Defines secure coding standards for Elixir teams. Implements security linting through Sobelow and Credo rules, creates secure coding guidelines for Phoenix and OTP. Designs secrets architecture through Vault with rotation, organizes security training for developers.
Backend Developer (Go) Required Defines secure coding standards for the Go team: mandatory gosec/govulncheck checks, secret management policies, security review checklist. Implements Go-specific secure coding guidelines, trains the team on vulnerability recognition.
Backend Developer (Java/Kotlin) Required Establishes team secure coding standards: mandatory security checks in PRs, approved crypto libraries, data classification policy. Implements security training and secure code review process.
Backend Developer (Node.js) Required Defines team secure coding standards: mandatory training, automated checks, security-focused code review. Implements secure coding culture. Conducts security workshops.
Backend Developer (PHP) Required Implements secure development lifecycle: threat modeling at design phase, automated security testing, post-deployment scanning. Develops security champions in the team.
Backend Developer (Python) Required Defines secure coding standards. Implements security review process. Trains the team. Coordinates with AppSec.
Backend Developer (Rust) Required Defines secure coding standards for Rust platform: mandatory unsafe review, fuzzing policy for parsers, secrets management through HashiCorp Vault. Develops security linting through custom clippy rules and implements SBOM generation through cargo-cyclonedx.
Backend Developer (Scala) Required Defines secure coding standards for Scala team: secure code review checklists, mandatory type-safe patterns, unsafe API prohibition. Implements automated security linting through WartRemover with custom rules, conducts security training and builds safe utilities library.
BI Analyst Defines secure development standards for the entire project's analytics team. Standardizes approaches to security in analytical code: tools, review process, compliance checks. Coordinates with the security team on security audits of analytical systems.
Blockchain Developer Required Defines secure coding strategy for blockchain development teams spanning smart contracts, DApp frontends, and infrastructure. Establishes security policies for contract audit requirements, secure upgrade mechanisms, and web3 security standards. Coordinates vulnerability response and trains teams on blockchain-specific secure coding patterns.
Cloud Engineer Defines security standards for cloud code: mandatory security scanning, secrets management policy, IAM review process. Introduces security-as-code practices.
Compiler Engineer Defines secure development standards for the compiler team: mandatory CI checks, security review processes, training the team on defensive programming practices.
Computer Vision Engineer Defines secure coding standards for the CV team, organizes security reviews of ML code. Coordinates model protection as intellectual property.
Data Analyst Defines secure coding standards for the analytics team, organizes security reviews and training. Integrates DevSecOps practices into the analytical solution development process.
Data Engineer Defines data security standards: secure pipeline guidelines, credentials management, audit requirements.
Data Scientist Defines security standards: ML security guidelines, data protection, audit requirements.
Database Engineer / DBA Defines secure development standards for the DBA team: mandatory security review of scripts, privilege management processes, stored procedure vulnerability auditing.
Desktop Developer (.NET WPF/WinUI/MAUI) Required Defines secure coding standards for .NET team. Establishes security review process. Coordinates security training.
Desktop Developer (Electron/Tauri) Required Defines secure coding standards for the Electron team. Establishes security review process. Coordinates security training.
Desktop Developer (Qt/C++) Required Defines secure coding standards for the Qt team. Establishes security review process. Coordinates security training for developers.
DevOps Engineer Defines DevSecOps standards: mandatory security scanning, signed artifacts, vulnerability policies. Implements security-by-default.
DevSecOps Engineer Required Defines secure development standards at the organizational level. Manages Security Champions program, training team leads to conduct security reviews. Integrates secure coding guidelines into IDE through SonarLint. Builds code security quality metrics by teams and projects.
Embedded Developer Defines secure coding standards for the embedded team. Establishes CERT C compliance process, conducts security code review.
Engineering Manager Defines secure coding policy for the engineering department, coordinates with the InfoSec team. Manages the security champions program and developer training.
Flutter Developer Required Defines secure coding strategy for Flutter mobile development teams. Establishes security policies for mobile data protection, secure API communication, and platform-specific security hardening requirements. Coordinates mobile security incident response and trains teams on OWASP MASVS-compliant development practices.
Frontend Developer (Angular) Establishes secure coding standards for the Angular team with review checklists. Conducts security code reviews and trains developers on XSS and CSRF protection practices.
Frontend Developer (React) Defines secure coding standards for the frontend team, including code review checklists and SAST. Organizes developer training on React application security specifics.
Frontend Developer (Svelte) Defines secure development standards for the frontend team, organizes security champions and training. Coordinates vulnerability remediation and dependency audits.
Frontend Developer (Vue) Defines secure development standards for frontend team. Conducts security reviews, configures automated dependency audit in CI and trains developers on best practices.
Fullstack Developer Defines security standards: secure coding guidelines, mandatory review, SAST/DAST integration.
Game QA Engineer Defines security testing standards: mandatory security tests, vulnerability management, security review process.
Game Server Developer Defines secure development standards for the server team. Conducts security reviews of critical systems, organizes security training, and coordinates exploit response.
Infrastructure Engineer Defines security baseline for organizational infrastructure with enforcement through policy-as-code. Designs security guardrails for self-service platform, preventing insecure configurations by default.
iOS Developer Required Defines secure coding standards for the iOS team: security guidelines, mandatory code review checklists, and automated checks. Implements secure development lifecycle: threat modeling at design stage, security testing in CI/CD, and production monitoring. Trains developers on preventing typical mobile vulnerabilities.
IoT Engineer Required Defines secure coding strategy for IoT development spanning firmware, edge, and cloud components. Establishes security policies for embedded code review, secure boot implementation, and device provisioning security requirements. Coordinates IoT security incident response and trains teams on safety-critical secure coding practices.
Language Tooling Engineer Defines secure development standards for all language tools. Conducts threat modeling and ensures security by design implementation across all toolchain components.
LLM Engineer Defines security standards: LLM safety guidelines, mandatory review, compliance.
ML Engineer Defines secure ML development standards for the organization: model governance, data lineage and access control. Designs ML platform security architecture with encryption, RBAC and compliance enforcement.
MLOps Engineer Defines secure development standards for the MLOps team: mandatory security checks in ML pipelines, review processes for custom operators, team training on ML-security best practices.
NLP Engineer Defines secure development standards for organizational ML/NLP projects. Conducts threat modeling and establishes security requirements for all NLP infrastructure components.
Penetration Testing Engineer Required Defines secure coding assessment strategy for penetration testing programs across the organization. Establishes policies for code-assisted pentesting, source code review standards, and vulnerability remediation verification. Coordinates large-scale code security assessments and trains red team members on code-level exploitation methodologies.
Performance Testing Engineer Defines security standards for the performance team: test environment access policies, procedures for using production-like data, secure test infrastructure management.
Platform Engineer Defines platform security standards: secure development guidelines, mandatory security review, vulnerability management. Implements security-as-code.
QA Automation Engineer Defines security standards for the team's test infrastructure. Conducts security reviews of test code, implements automatic checks for secret leaks in test repositories.
QA Engineer (Manual) Defines secure coding standards for test automation at the team/product level. Standardizes security practices in test code and coordinates security reviews.
QA Security Engineer Required Defines organizational secure coding standards: language-specific guidelines, mandatory training, code review security checklist. Builds secure coding culture.
React Native Developer Required Defines the security strategy for the team's mobile apps. Establishes secure coding guidelines for React Native — code review checklist, mandatory security checks. Implements SAST/DAST in the CI/CD pipeline. Coordinates penetration testing and security audits of mobile apps.
Release Engineer Establishes secure coding standards for all release infrastructure. Conducts security reviews of CI/CD configurations and trains teams on supply chain protection practices.
Security Analyst Required Defines security analysis strategy integrating secure coding intelligence across monitoring operations. Establishes policies for code-informed detection engineering, vulnerability correlation workflows, and code-level threat analysis standards. Coordinates cross-team security analysis for application vulnerabilities and trains analysts on code-aware investigation techniques.
Site Reliability Engineer (SRE) Defines SRE security standards: infrastructure security policies, secrets management, access control review. Implements security-as-code.
Smart Contract Developer Required Defines secure coding strategy for smart contract development spanning protocol design, audit processes, and deployment safeguards. Establishes security policies for formal verification requirements, economic invariant testing, and vulnerability bounty programs. Coordinates security incident response for DeFi protocols and trains teams on adversarial secure coding practices.
Solutions Architect Defines security standards: secure architecture guidelines, mandatory security review, compliance requirements.
Systems Programmer (C/C++) Defines security standards: memory safety requirements, code audit, vulnerability process.
Technical Lead Defines team security standards: secure coding guidelines, mandatory security review, SAST/DAST integration. Conducts security training and architecture reviews.
Telecom Developer Defines secure coding standards for telecom development considering GSMA and 3GPP security specifications. Designs security architecture for protecting telecom infrastructure from APT and nation-state attacks.
Unity Developer Defines security standards: secure coding guidelines, anti-cheat requirements, review process.
Unreal Engine Developer Defines security standards: C++ safety guidelines, memory safety requirements.
XR Unity Developer Defines secure coding standards for XR team, including code review checklists and SAST tools. Organizes developer training on immersive application security specifics.
Role Required Description
1C Developer Shapes organizational culture of secure development on the 1C platform. Defines data protection and access control standards ensuring security of all 1C systems.
AI Product Engineer Defines corporate secure AI product development strategy with DevSecOps practice integration. Influences industry ML system security standards and coordinates zero-trust architecture implementation.
Analytics Engineer Defines the corporate secure analytics engineering strategy integrating data governance and compliance. Shapes the data protection architecture ensuring GDPR, CCPA, and industry regulator compliance.
Android Developer Required Shapes the Android development security culture at the organizational level: secure SDLC standards for mobile applications, security champions program in teams, incident response processes for mobile vulnerabilities. Manages compliance (GDPR data handling on device, PCI DSS for payments), defines penetration testing strategy, coordinates bug bounty program for mobile applications.
Application Security Engineer Required Defines enterprise secure coding strategy shaping security architecture and development practices across all technology platforms. Coordinates organizational compliance programs integrating secure coding standards with SOC2, ISO 27001, and PCI DSS requirements. Represents the organization in security standards bodies and industry security communities.
AR/VR Developer Shapes the organizational AR/VR application security strategy. Creates an XR security framework with privacy protection, anti-cheat systems, and secure sensor data processing.
Backend Developer (C#/.NET) Required Defines secure development lifecycle: security requirements, threat modeling, testing, incident response. Shapes security culture.
Backend Developer (Elixir) Required Develops platform secure coding strategy for the Elixir ecosystem. Defines security baseline for all services: Sobelow, mix audit, Cloak.Ecto for encryption. Designs framework of secure abstractions for typical tasks: authentication, authorization, encryption.
Backend Developer (Go) Required Shapes organizational secure coding standards for Go: unified security policies, automated checking via custom go/analysis linters. Develops platform libraries for cryptography, authentication, and authorization with built-in security.
Backend Developer (Java/Kotlin) Required Defines organizational secure development lifecycle: security requirements, threat modeling, security testing, incident response. Shapes security engineering culture.
Backend Developer (Node.js) Required Designs secure development program: secure-by-default frameworks, automated security verification, developer security enablement. Defines organizational secure SDLC for Node.js.
Backend Developer (PHP) Required Defines secure development strategy at organizational level: security frameworks, compliance automation, security training program. Designs security platform for all services.
Backend Developer (Python) Required Shapes secure SDLC. Defines security requirements. Implements DevSecOps practices.
Backend Developer (Rust) Required Shapes secure development culture on Rust in the organization: security champions program, mandatory training on unsafe code and cryptography. Defines secure SDLC processes, threat modeling standards for new services and zero-trust architecture between Rust microservices.
Backend Developer (Scala) Required Shapes secure development culture at organizational level: secure coding standards for Scala, Security Champions program, onboarding integration. Defines security by design architectural patterns — zero trust, defense in depth, principle of least privilege — for the entire Scala platform.
BI Analyst Shapes corporate secure development standards for analytical systems. Defines security architecture for enterprise data platforms and compliance frameworks. Publishes best practices for secure analytics development for the industry.
Blockchain Developer Required Defines enterprise security strategy. Shapes security architecture. Coordinates compliance. Represents organization in the security community.
Cloud Engineer Shapes cloud security strategy: security architecture framework, compliance automation, threat modeling for cloud infrastructure. Defines security governance.
Compiler Engineer Shapes compiler codebase security strategy at the organizational level: formal methods for verification, static analyzer integration, security champions program.
Computer Vision Engineer Shapes secure CV system development strategy for the organization. Defines model security, data privacy, and compliance policies for ML products.
Data Analyst Shapes secure development strategy for the organization's analytical platform. Defines data protection policies, compliance requirements, and coordinates with the information security team.
Data Engineer Shapes data security strategy: platform-wide security architecture, compliance framework, data protection governance.
Data Scientist Shapes ML security strategy: responsible AI, privacy-preserving ML, governance.
Database Engineer / DBA Shapes code security strategy for data management: secure development standards for database tooling, SAST/DAST integration for DBA tools, compliance automation.
Desktop Developer (.NET WPF/WinUI/MAUI) Required Shapes enterprise secure coding standards for .NET. Evaluates .NET security features. Defines secure development lifecycle for the organization.
Desktop Developer (Electron/Tauri) Required Shapes enterprise secure coding standards for Electron. Evaluates security tools. Defines secure development lifecycle.
Desktop Developer (Qt/C++) Required Shapes enterprise secure coding standards for C++/Qt. Evaluates new compiler security features. Defines secure SDLC for the organization.
DevOps Engineer Shapes DevSecOps strategy: end-to-end supply chain security, compliance automation, security architecture. Defines security governance.
DevSecOps Engineer Required Shapes secure development culture at organizational scale. Designs Secure-by-Default framework architecture minimizing the possibility of creating vulnerable code. Defines Shift Left Security strategy. Integrates secure coding into hiring and engineer evaluation processes.
Embedded Developer Defines enterprise secure coding strategy for embedded. Establishes approaches to IEC 62443 compliance, mentors leads on security practices.
Engineering Manager Shapes secure development strategy at the organizational level, defines secure SDLC standards. Coordinates DevSecOps practice and compliance requirement adoption.
Flutter Developer Required Defines enterprise mobile secure coding strategy for Flutter and cross-platform ecosystems. Shapes mobile security architecture integrating OWASP MASVS compliance with organizational development standards. Coordinates mobile security compliance and represents the organization in mobile security communities and platform security programs.
Frontend Developer (Angular) Shapes organizational frontend code security strategy. Creates a security framework for Angular with automated checks and compliance controls.
Frontend Developer (React) Shapes secure frontend development culture at the organizational level. Defines client-side code protection strategy for the React product portfolio considering industry standards.
Frontend Developer (Svelte) Shapes secure frontend development strategy for the organization, including supply chain security. Defines client application and user data protection policies.
Frontend Developer (Vue) Shapes frontend development security program for the organization. Introduces DevSecOps for client applications, defines architectural protection patterns and threat model.
Fullstack Developer Shapes security strategy: fullstack security architecture, compliance, security governance.
Game QA Engineer Shapes security QA strategy: platform-wide security testing, compliance validation, security governance.
Game Server Developer Shapes the secure development program for the game studio. Creates a threat modeling framework for game servers, defines architectural patterns for anti-cheat protection.
Infrastructure Engineer Shapes security by design strategy for organizational infrastructure with automatic compliance enforcement. Defines security practice evolution considering supply chain security and infrastructure identity management.
iOS Developer Required Develops security-first culture for the iOS platform: protection strategy at all levels from compilation to runtime. Defines standards for sensitive data handling: medical, financial, and personal with regulatory compliance. Implements bug bounty program, security champions in the team, and regular external mobile application audits.
IoT Engineer Required Defines enterprise security strategy. Builds security architecture. Coordinates compliance. Represents the organization in the security community.
Language Tooling Engineer Shapes organizational culture of secure language tool development. Defines industry security standards for source code processing and analysis systems.
LLM Engineer Shapes LLM safety strategy: responsible AI architecture, compliance governance.
ML Engineer Shapes organizational secure ML development strategy considering AI Act, GDPR and industry regulations. Defines responsible AI approaches: fairness, transparency, accountability at platform level.
MLOps Engineer Shapes the organization's ML code security strategy: supply chain security for ML dependencies, secure model provenance, standards for trustworthy AI development.
NLP Engineer Shapes organizational culture of secure ML system development. Defines AI application protection standards against specific threats, influencing industry security practices.
Penetration Testing Engineer Required Defines enterprise offensive security strategy integrating code-level vulnerability research with infrastructure and application security assessments. Shapes organizational red team capabilities combining source code analysis with advanced exploitation techniques. Coordinates industry compliance and represents the organization in vulnerability research and security conference communities.
Performance Testing Engineer Shapes secure performance testing strategy for the organization: compliance requirements for test environments, data masking standards, isolation architecture for performance lab.
Platform Engineer Shapes platform security strategy: zero-trust platform, supply chain security, compliance automation. Defines platform security governance.
QA Automation Engineer Shapes test platform security strategy for the organization. Creates a framework for secure test data and environment management for dozens of teams.
QA Engineer (Manual) Shapes corporate security QA and application security testing methodology. Defines industry standards for integrating security testing into QA processes. Publishes research on the effectiveness of various security testing approaches in the SDLC.
QA Security Engineer Required Designs secure development strategy: secure-by-default frameworks, automated security verification, developer security enablement. Defines organizational secure SDLC.
React Native Developer Required Shapes the enterprise security strategy for mobile development. Defines compliance framework — OWASP MASVS, GDPR, SOC2 for mobile applications. Designs security architecture — secure SDLC, incident response plan. Coordinates security practices across mobile teams.
Release Engineer Shapes organizational strategy for release code and infrastructure security. Creates platform solutions for ensuring software supply chain security at every delivery stage.
Security Analyst Required Defines enterprise security analysis strategy integrating code intelligence with threat detection across application, network, and cloud environments. Shapes security operations architecture leveraging secure coding insights for advanced detection capabilities. Coordinates organizational compliance and represents the organization in threat intelligence and security analysis communities.
Site Reliability Engineer (SRE) Shapes infrastructure security strategy: zero-trust infrastructure, automated compliance, security architecture for operations. Defines security governance.
Smart Contract Developer Required Defines enterprise smart contract secure coding strategy spanning protocol development, security audit standards, and on-chain incident response. Shapes security architecture for DeFi ecosystems integrating formal verification, economic simulation, and adversarial testing methodologies. Represents the organization in Web3 security standards bodies and blockchain security communities.
Solutions Architect Shapes security strategy: organizational security architecture, compliance framework, security governance.
Systems Programmer (C/C++) Shapes system security strategy: memory safety architecture, formal verification, governance.
Technical Lead Shapes the organization's security strategy: security architecture framework, compliance automation, security culture. Defines security governance and risk management.
Telecom Developer Shapes secure telecom system development strategy considering NESAS/SCAS certification requirements. Defines security-by-design approaches for 5G and Open RAN with supply chain attack protection.
Unity Developer Shapes game security strategy: platform security architecture, compliance, governance.
Unreal Engine Developer Shapes security strategy: platform security architecture, C++ safety governance.
XR Unity Developer Shapes secure XR development culture at organizational level. Defines code and data protection strategy for the entire XR application portfolio considering regulatory requirements.

Community

👁 Watch ✏️ Suggest Change Sign in to suggest changes
📋 Proposals
No proposals yet for Secure Coding Practices
Loading comments...