Senior Staff Security Engineer
To see similar active jobs please follow this link: Remote System Administration jobs
While the company is remote worldwide, hiring for this position will be focused around the Northeast region (Boston to DC) of the United States, with the aim of hiring in either the NYC or Pittsburgh areas. Any candidates outside of the core region will require availability in the GMT-5 to GMT-8 time zones (US Eastern Time Zone) Monday through Friday.
Additionally, you must have previous experience working at startups, with a preference for experience at an early-stage startup. Experience working with engineering teams within a software development firm is strongly preferred.
All that can meet these requirements should apply regardless of location.
As a Senior Staff Security Engineer, you’ll be able to protect and secure the Voltron Data and Apache Arrow ecosystems. You'll work as a Tech Lead on the SecOps team and be responsible for application security and compliance initiatives within the company. You will be responsible for the research, architecture, development, and delivery of these focus areas and other security initiatives, either working solo or with other members of the SecOps team. Importantly, we are looking for a Security Engineer who does not work in silos and is willing to share knowledge and responsibilities with other team members, including collaborating with DevOps, IT, and engineering teams for security initiatives.
NOTE: There will be an expectation of rolling incident response schedule sharing as a part of this role. This will be a shared responsibility with other SecOps and IT members.
What you will be working on:
Below is a rough timeline of where you can expect to be at different points during your career path starting in this position.
Upon joining and within a month:
Learning and understanding current security processes and tools in use
Growing knowledge of key infrastructure and applications, including their risks for vulnerabilities
Work directly with application developers and build engineers to understand the fundamental architecture of our products to understand how SecOps can integrate and work with these teams
Within 3 months:
Coordinating with team members and owners of identified issues to remediate them quickly, detailing findings and process
Building out and tuning our SAST and DAST tooling
Begin working with directors, managers, and team leads to explore building out processes and SLAs
Coordinating with development teams on building and integrating security tooling for new and existing projects
After 6 months:
Crafting proposals to address identified risks and improve existing solutions through forward-thinking approaches
Growing responsibilities to own and maintain key aspects of the AppSec tooling, pipelines and/or processes, mentoring others in the future
Evaluating new tools and services for potential use and reporting findings for team review
Prioritizing areas for improvement in our existing processes and proactively addressing them through collaboration with DevOps and relevant teams
Supervising auditing, pen-testing, remediation, and investigations; detailing findings and processes with reports to leadership
Mentoring SecOps team members and continually educating the entire company about good security habits and practices
Identifying areas of opportunity to increase our level of compliance with our existing frameworks and evaluate others as needed by customer and product demands
Previous experience:
Familiarity with threat modeling and TTP frameworks (STRIDE, MITRE)
Experience as a team lead in Information Security engineering or application security engineering and more than one certification or their equivalents from the list below
A background working with software engineering teams to develop plans for application security and ensure a secure environment
Prior experience with Zero Trust systems and workflows
Experience developing project plans, leading projects, and delivering projects
Prior work with open-source development teams; understanding the vulnerabilities open-source dependencies can bring
Hands-on experience with security tools (Datadog, Crowdstrike, or equivalents) as well as command-line tools for audits, pen-testing, and investigations
Snyk (CLI, Dashboard and IDE integrations) or Equivalent SAST/DAST tooling stack
Experience with navigating earning certifications such as SOC 2, ISO27001, HIPAA, PCI
Familiarity with GDPR, US Data Privacy, and other legal frameworks
Creation of vulnerability remediation systems and workflows
Linux system administration experience (Ubuntu and CentOS strongly preferred)
Experience with containerized infrastructure and Kubernetes
Worked with cloud services (AWS, Azure, GCP, and/or others) and remote infrastructure in a colocation environment, implementing tailored security controls in each environment
Intermediate proficiency with one of the following languages: Python, C++, or Go
Experience working for a remote company and hands-on exposure with a global remote user base
Preferred but not required certifications:
CISSP: Certified Information Systems Security Professional
CISM: Certified Information Security Manager
CEH: Certified Ethical Hacker
CSX-P: CSX Cybersecurity Practitioner
CompTIA Security+
DSOE: DevSecOps Engineering
Potential Long-Term Career Paths
SecOps Manager
SecOps Director
US Compensation - The salary range for this role is between $150,000-$220,000. We have a global market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the exact base pay will vary based on factors such as actual work location, skills and experience of the candidate. This position is also eligible for additional incentives such as equity awards.
About the job
Senior Staff Security Engineer
To see similar active jobs please follow this link: Remote System Administration jobs
While the company is remote worldwide, hiring for this position will be focused around the Northeast region (Boston to DC) of the United States, with the aim of hiring in either the NYC or Pittsburgh areas. Any candidates outside of the core region will require availability in the GMT-5 to GMT-8 time zones (US Eastern Time Zone) Monday through Friday.
Additionally, you must have previous experience working at startups, with a preference for experience at an early-stage startup. Experience working with engineering teams within a software development firm is strongly preferred.
All that can meet these requirements should apply regardless of location.
As a Senior Staff Security Engineer, you’ll be able to protect and secure the Voltron Data and Apache Arrow ecosystems. You'll work as a Tech Lead on the SecOps team and be responsible for application security and compliance initiatives within the company. You will be responsible for the research, architecture, development, and delivery of these focus areas and other security initiatives, either working solo or with other members of the SecOps team. Importantly, we are looking for a Security Engineer who does not work in silos and is willing to share knowledge and responsibilities with other team members, including collaborating with DevOps, IT, and engineering teams for security initiatives.
NOTE: There will be an expectation of rolling incident response schedule sharing as a part of this role. This will be a shared responsibility with other SecOps and IT members.
What you will be working on:
Below is a rough timeline of where you can expect to be at different points during your career path starting in this position.
Upon joining and within a month:
Learning and understanding current security processes and tools in use
Growing knowledge of key infrastructure and applications, including their risks for vulnerabilities
Work directly with application developers and build engineers to understand the fundamental architecture of our products to understand how SecOps can integrate and work with these teams
Within 3 months:
Coordinating with team members and owners of identified issues to remediate them quickly, detailing findings and process
Building out and tuning our SAST and DAST tooling
Begin working with directors, managers, and team leads to explore building out processes and SLAs
Coordinating with development teams on building and integrating security tooling for new and existing projects
After 6 months:
Crafting proposals to address identified risks and improve existing solutions through forward-thinking approaches
Growing responsibilities to own and maintain key aspects of the AppSec tooling, pipelines and/or processes, mentoring others in the future
Evaluating new tools and services for potential use and reporting findings for team review
Prioritizing areas for improvement in our existing processes and proactively addressing them through collaboration with DevOps and relevant teams
Supervising auditing, pen-testing, remediation, and investigations; detailing findings and processes with reports to leadership
Mentoring SecOps team members and continually educating the entire company about good security habits and practices
Identifying areas of opportunity to increase our level of compliance with our existing frameworks and evaluate others as needed by customer and product demands
Previous experience:
Familiarity with threat modeling and TTP frameworks (STRIDE, MITRE)
Experience as a team lead in Information Security engineering or application security engineering and more than one certification or their equivalents from the list below
A background working with software engineering teams to develop plans for application security and ensure a secure environment
Prior experience with Zero Trust systems and workflows
Experience developing project plans, leading projects, and delivering projects
Prior work with open-source development teams; understanding the vulnerabilities open-source dependencies can bring
Hands-on experience with security tools (Datadog, Crowdstrike, or equivalents) as well as command-line tools for audits, pen-testing, and investigations
Snyk (CLI, Dashboard and IDE integrations) or Equivalent SAST/DAST tooling stack
Experience with navigating earning certifications such as SOC 2, ISO27001, HIPAA, PCI
Familiarity with GDPR, US Data Privacy, and other legal frameworks
Creation of vulnerability remediation systems and workflows
Linux system administration experience (Ubuntu and CentOS strongly preferred)
Experience with containerized infrastructure and Kubernetes
Worked with cloud services (AWS, Azure, GCP, and/or others) and remote infrastructure in a colocation environment, implementing tailored security controls in each environment
Intermediate proficiency with one of the following languages: Python, C++, or Go
Experience working for a remote company and hands-on exposure with a global remote user base
Preferred but not required certifications:
CISSP: Certified Information Systems Security Professional
CISM: Certified Information Security Manager
CEH: Certified Ethical Hacker
CSX-P: CSX Cybersecurity Practitioner
CompTIA Security+
DSOE: DevSecOps Engineering
Potential Long-Term Career Paths
SecOps Manager
SecOps Director
US Compensation - The salary range for this role is between $150,000-$220,000. We have a global market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the exact base pay will vary based on factors such as actual work location, skills and experience of the candidate. This position is also eligible for additional incentives such as equity awards.