I own the appsec process for multitenant SaaS platforms on Rails and Node.js. I define what gets reviewed, build the CodeQL and Semgrep pipelines, write the secure coding standards engineering teams adopt, and train developers so security scales without me being a bottleneck. 15+ client organizations, 110+ bug bounty vulnerabilities.
I lead application security engagements for multitenant SaaS platforms. I own the full lifecycle: scoping, threat modeling, security code review, tooling setup, remediation guidance, developer training, and follow-up validation. Most of my work is on Rails monoliths and Node.js services backed by Postgres.
I've reported over 110 validated vulnerabilities to companies like PayPal, Sony, AT&T, Airbnb, and Booking.com through HackerOne. The focus is always web app security: access control, authentication, tenant isolation, input validation, API flaws.
What I bring at the senior level is the ability to make security scale. I define review standards, build CodeQL and Semgrep pipelines that run on every PR, write secure coding guidelines that engineering teams adopt as their own, and mentor junior security consultants. The goal is a codebase that gets permanently better, not a team that depends on me to catch everything.
Before I touch code, I need to understand how the application works. Data flows, trust boundaries, tenant isolation. The threat model tells me where to look and what to prioritize.
I write CodeQL and Semgrep rules for patterns I keep seeing. Plug Brakeman, dependency auditing, and custom scanners into CI/CD so the same class of bug gets caught before it ships.
I build secure coding patterns engineers can reuse. Run training sessions. Sit in on PRs. The goal is a team that writes secure code by default, not a team that waits for me to find problems.
Security Tools: CodeQL, Semgrep, Brakeman, Burp Suite Pro, OWASP ZAP, Nuclei
Languages: Ruby, Python, JavaScript/TypeScript, Go, Bash, SQL
Web Frameworks: Ruby on Rails, Node.js, React
Infrastructure: AWS (ECS, RDS, IAM, S3), Postgres, Redis, Kafka, Memcached, Docker
Practices: Threat modeling, security code review, secure SDLC, OWASP Top 10, OWASP ASVS
If you're looking for a senior appsec engineer who owns the process and makes engineering teams permanently better, I'd like to hear about it.