Provable Markets

Application Security Engineer

Provable Markets

full-time

Posted on:

Location Type: Remote

Location: United States

Visit company website

Explore more

AI Apply
Apply

Tech Stack

About the role

  • Own application-layer security across Provable’s products, internal services, and developer-facing tooling
  • Perform threat modeling, security architecture reviews, and design reviews for new systems and features
  • Identify, reproduce, and remediate vulnerabilities across APIs, web services, SDKs, and backend systems
  • Build and embed secure development practices, including secure coding standards, dependency security, access controls, and CI/CD integration
  • Partner with engineers on testing, audits, incident response, and ongoing security improvements in a privacy-first environment

Requirements

  • 5+ years of experience in application, product, or software security engineering
  • Strong understanding of common application security risks, including authentication, authorization, API security, and cryptographic misuse
  • Experience securing production backend systems and developer platforms, with the ability to reason about systems-level code (Rust a strong plus)
  • Familiarity with modern secure software development practices, authentication systems, and key management
  • Clear communicator with a pragmatic security mindset suited to high-trust, fast-moving engineering teams
Benefits
  • Monthly budget for expenses relating to working in a remote environment (home office setup & supplies, transportation, fitness & personal well-being, continued learning, etc.).
  • Comprehensive, top-tier healthcare coverage.
  • Flexible vacation policy.
  • Ability to attend major industry conferences and global events at the company’s expense.
  • Regular team off-sites and retreats.

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
application securitythreat modelingsecurity architecturevulnerability remediationsecure coding standardsdependency securityCI/CD integrationRustauthentication systemskey management
Soft skills
clear communicatorpragmatic security mindset