Web & Application Security Engineer (WAF/Bot Protection)

Overview

Remote
Depends on Experience
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 24 Month(s)
No Travel Required
Unable to Provide Sponsorship

Skills

Akamai
Amazon Web Services
Continuous Delivery
Continuous Integration
Dashboard
DevOps
High Availability
Documentation
Firewall
Management
F5
HTTP
Imperva
Incident Management
Application Service Management
Auditing
Oracle ASM
Regulatory Compliance
Security Controls
Cloud Computing
Microsoft Azure
OWASP
Threat Analysis
WAF
Web Application Security
Web Applications
Workflow

Job Details

Web & Application Security Engineer (WAF/Bot Protection)
Location: 100% Remote
Duration: Long term

 
Imperva - Web Application Firewall (WAF)
Imperva - Advanced Bot Protection (ABP)
 
Web & Application Security Engineer (WAF/Bot Protection)
We are seeking a skilled Web & Application Security Engineer with hands-on expertise in Imperva WAF, Imperva Advanced Bot Protection (ABP), Akamai, F5, and Cloudflare security platforms. The ideal candidate will protect mission-critical applications by deploying, tuning, and managing advanced L7 security controls.
Key Responsibilities
Deploy, configure, and optimize Imperva WAF and ABP to defend against OWASP Top 10, bot attacks, and L7 threats.
Manage WAF and bot protection solutions across Akamai Kona, F5 ASM/AdvWAF, and Cloudflare Security Suite.
Perform rule tuning, false-positive reduction, traffic analysis, and incident response.
Investigate malicious traffic patterns, automate mitigation strategies, and maintain high availability across multi-CDN environments.
Partner with DevOps, Cloud, and Application teams to integrate security into CI/CD workflows and application releases.
Maintain dashboards, reports, and documentation for audits, compliance, and operational readiness.
Required Skills & Experience
9+ years of experience in web application security or WAF/bot protection engineering.
Strong understanding of HTTP/S, APIs, bot behavior, and modern attack vectors (credential stuffing, scraping, L7 DDoS).
Hands-on experience with at least two of the following: Imperva, Akamai, F5, Cloudflare, AWS/Azure native WAFs.
Ability to analyze logs, packet flows, and threat intelligence data.
 

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.