Application Security Manager embedding security directly into products, pipelines, and development workflows at ShareGate. Working closely with developers to ensure secure software delivery.
Responsibilities
Ensure security is embedded into CI/CD pipelines by delivering scalable, automated tooling and integrated security checks (SAST, DAST, SCA, secret scanning);
Enable secure-by-default development by designing and implementing automated, policy-driven security review workflows;
Establish robust security guardrails within AI-assisted development and agent workflows to reduce risk while maintaining developer velocity;
Reduce risk exposure by proactively identifying, assessing, and driving remediation of application security vulnerabilities;
Strengthen application security posture by leading threat modeling and security assessments for new features and architectural changes;
Improve detection and response capabilities through the development of automation, tooling, and streamlined vulnerability management processes;
Elevate cloud and application security by partnering with Infrastructure SecOps to harden Azure environments and deployment practices;
Enhance external security feedback loops by contributing to and scaling the bug bounty program and vulnerability intake processes.
Requirements
8+ years of experience in application security, DevSecOps, or security-focused software development;
Strong software engineering background combined with deep security expertise;
Deep understanding of web application security principles, OWASP Top 10, and CWE Top 25;
Hands-on experience performing secure code reviews in C#;
Experience building and maintaining security automation in CI/CD pipelines (GitHub Actions preferred);
Solid understanding of Azure cloud services, infrastructure security, and deployment patterns;
Experience integrating SAST, DAST, SCA, and secret scanning tools into development workflows;
Proficiency in scripting (Python, Bash) for automation and tooling;
Extensive hands-on experience with AI-assisted and agentic development workflows;
Familiarity with authentication protocols such as OIDC, SAML, and OAuth;
Ability to clearly communicate security risks and trade-offs to both technical and non-technical stakeholders.
Advisor in information security governance at Exposant 3, defining frameworks compliant with international standards and ensuring organizational security compliance. Collaborating on awareness and training efforts within a human - centered, innovative team.
Operational Information Security Specialist at Exposant 3 overseeing information security activities and implementing security controls. Collaborating on major projects within a human - centered and innovative firm.
Lead security strategy and ICS - guided emergency response programs at AltaGas. Shape a unified, risk - based framework to strengthen operational resilience and advance zero - harm commitment.
Cyber Threat Intelligence Specialist leveraging AI and machine learning for threat analysis at Intact Financial. Focused on creating predictive intelligence models to enhance security operations.
Security Advisor Specialist for the IAM team at Intact, developing SailPoint IIQ solutions and enhancing identity governance processes. Responsible for driving compliance and teaching best practices
Project Manager II focused on integrating new customers into TELUS' Internet and Security operations. Collaborating across teams to drive successful transition and enhance customer experiences.
Financial Security Advisor managing your own insurance agency with Co - operators in Quebec. Helping clients assess and implement solutions for financial security needs.
Application Security Lead at Workleap enhancing security in development pipelines. Responsible for the security integration in product development and collaboration across teams.
Application Security Manager at Workleap embedding security in products and development workflows. You will write code, build tooling, and ensure secure software delivery.
Sr. Cybersecurity Advisor at Optiv designing security solutions tailored to clients’ needs. Driving thought leadership and collaborating with teams to achieve cybersecurity objectives.