Senior Web App Pen Tester; San Diego or Irvine
San Diego, San Diego County, California, 92189, USA
Listed on 2026-01-12
-
IT/Tech
Cybersecurity
Senior Web App Pen Tester (San Diego or Irvine)
CoStar Group (NASDAQ: CSGP) is a leading global provider of commercial and residential real estate information, analytics, and online marketplaces. Included in the S&P 500 Index and the NASDAQ 100, CoStar Group is on a mission to digitize the world’s real estate, empowering all people to discover properties, insights and connections that improve their businesses and lives. We have been living and breathing the world of real estate information and online marketplaces for over 35 years, giving us the perspective to create truly unique and valuable offerings to our customers.
This position is located in San Diego, CA or Irvine, CA and is in office Monday through Thursday with work from home on Friday.
Responsibilities- Conduct penetration tests on web applications and underlying infrastructure for vulnerabilities using both manual and automated techniques.
- Demonstrate risk of detected issues to both technical and non‑technical audiences.
- Work with the software and product teams to help ensure applications are designed and implemented securely during the SDLC.
- Consume a variety of application security tools (DAST, SAST, SCA, credential scanning, IAC scanning) to secure web applications during development and production run‑time.
- Utilize sustainable methods to automate finding feedback to generate developer work items and trigger re‑scan when associated work items are closed.
- Recommend code changes to eliminate vulnerabilities.
- Automate security testing at various stages within the CI/CD pipeline.
- Bachelor’s Degree required from an accredited, non‑profit university or college (preferably in Computer Science or Cybersecurity).
- A track record of commitment to prior employers.
- 3+ years total experience in a technical role with at least 1 year of professional experience penetration testing.
- Experience with web application penetration testing, identifying and exploiting attack chains to evaluate the severity of vulnerabilities within a web application.
- Experience writing comprehensive reports that clearly demonstrate the risk of vulnerabilities to developers and technical leadership.
- Experience with defense‑in‑depth strategies to help mitigate existing risk within applications.
- Experience with common programming languages: C#, Java, C/C++, Python, or Go.
- Scripting/programming skills in Python, Power Shell, GoLang, Perl, JavaScript, .NET, and API integration.
- Security tooling automation in CI/CD pipelines and IDE interfaces, including Static Application Security Testing (SAST) and Static Application Analysis (SCA) solutions such as Veracode, Check Marx, App Scan, X‑Ray, Synopsys, or Snyk; and Dynamic Application Security Testing (DAST) through Metasploit, Burp Suite, OWASP ZAP, Acunetix, etc.
- Industry relevant professional certifications such as:
Offensive Security Web Assessor (OSWA) / Expert (OSWE), Offensive Security Certified Professional (OSCP) / Experienced (OSEP), Hack the Box Bug Bounty Hunter (CBBH) / Web Exploitation Expert (CWEE), Hack the Box Penetration Testing Specialist (CPTS) / AD Pentesting Expert (CAPE), INE Security Web Application Penetration Tester eXtreme (eWPTX). These certifications can be substituted with considerable experience in CTFs, impressive CVEs, or impressive bug bounty reports.
- In‑depth understanding of various assessment tools.
- Knowledge of infrastructure operations across databases, network, and system administration.
- Ability to communicate with different levels of leadership, conveying risk and driving urgency for risk remediation.
- Experience coordinating with application teams to drive security‑by‑design principles.
- Ability to mentor and train team members to prioritize security efforts effectively.
- A self‑starter who can advance the application security program and follow‑through ideas to completion.
- Passionate about cyber security and keeping up with the latest threat landscape trends.
- Hands‑on experience implementing security tools into CI/CD pipelines.
- Experience testing modern applications in cloud‑native tech stacks.
- Experience with mobile application penetration testing.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).