Application Security Engineer @ Cimpress India
Your Application Journey
Email Hiring Manager
Job Details
About Application Security Engineer
Cimpress India, under the WIRmachenDRUCK brand, is the world leader in mass customization. In this role, you will shape the security vision by implementing secure coding practices and performing thorough penetration testing on a variety of applications and infrastructures.
Key Responsibilities
- Work with the development community to implement secure coding practices.
- Conduct penetration tests on web applications, networks, and cloud infrastructures.
- Automate testing methodologies and analyze vulnerability reports.
- Participate in security design discussions and deliver training/workshops.
Required Qualifications
3-5 years of software engineering experience with a strong background in application security and penetration testing. Excellent communication skills are essential for presenting solutions and sharing knowledge.
- Hands-on experience with security testing tools (e.g., Burp Suite, Nessus, OWASP ZAP).
- Familiarity with AWS, LAMP stack, Docker, Kubernetes, and CI tools.
- Proficiency in scripting languages (PHP, BASH, Node.js).
- Possession of relevant certifications like CEH, CISSP, OSCP, CPENT.
Nice to Have
Awareness of security protocols, risk frameworks (ISO 27001, NIST CSF), and modern security tools.
Why You'll Love Working Here
Embrace innovation, autonomy and a remote-first culture that fosters creativity and growth. Join a team where your expertise directly impacts a large developer community.
Key skills/competency
Application Security, Penetration Testing, Secure Coding, AWS, LAMP, Docker, Kubernetes, CI/CD, Scripting, Vulnerability Assessment
How to Get Hired at Cimpress India
🎯 Tips for Getting Hired
- Customize your resume: Highlight your security testing and coding skills.
- Research Cimpress India: Understand the company culture and tech stack.
- Showcase certifications: Emphasize your CEH, CISSP, OSCP, or CPENT credentials.
- Prepare case studies: Bring examples of vulnerability fixes and process improvements.