Senior Security Engineer
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, Systems Engineer -
Engineering
Cybersecurity, Systems Engineer
The Senior Security Engineer is a hands‑on, high‑impact technical role responsible for designing, implementing, and automating robust security controls across our application stack and cloud environments (primarily AWS, with GCP considerations).
You will strengthen our end‑to‑end security posture by proactively identifying and remediating vulnerabilities, developing advanced security solutions across the SDLC through production, and building scalable automation using Python, Go, Terraform, and Tines. Your work will directly contribute to the prevention of unauthorized PHI access and exfiltration, helping us evolve toward a proactive defense model.
This is a remote role reporting to the Senior Manager, Security Engineering and plays a critical role in advancing our overall security maturity and resilience.
Responsibilities- Design, build, and implement Just-in-Time (JIT) access controls and Privileged Access Management (PAM) workflows to eliminate standing privileged accounts in production.
- Conduct platform permission reviews and implement a least‑privilege access model for cloud and application roles.
- Ensure 100% of production access requests and approvals are captured in audit logs.
- Lead the implementation, tuning, and operation of security tools in the CI/CD pipeline, including SAST, DAST, SCA, and secrets scanning.
- Develop custom SAST rules to detect specific, high‑risk flaw patterns, such as authorization bypasses or insecure PII/PHI handling.
- Partner with engineering to deploy IDE plugins and automated PR checks that block sensitive data exposure before deployment.
- Conduct manual security code reviews for high‑risk features and cryptographic implementations.
- Design, build, and maintain automation for the end‑to‑end vulnerability management lifecycle.
- Engineer automated workflows to triage, validate, and assign new vulnerabilities
- Develop and maintain security automation scripts, tools, and services in Python or Go to streamline security operations and compliance checks.
- Partner with Sec Ops to build high‑fidelity SIEM correlation rules and automated response playbooks.
- Design, implement, and maintain encryption strategies for data at rest and in transit, ensuring PHI is protected in compliance with HIPAA.
- Manage the cryptographic key lifecycle and administer key management systems
- Design and implement secure cloud network architectures (VPCs, subnets, security groups, NACLs) and network segmentation strategies.
- Lead the remediation of cloud security findings
- Implement and manage a centralized security control plane
- Design and implement Data Loss Prevention (DLP) policies for endpoints and cloud services to protect against sensitive data exfiltration.
- Design and enforce security configurations and hardening standards for diverse operating systems (macOS, Windows, Linux) via MDM/UEM platforms.
- Manage and tune endpoint security solutions, including EDR/XDR (e.g., Crowd Strike).
- Lead threat modeling sessions for new features and conduct secure design reviews of system architectures, applications, and APIs.
- Act as an embedded security partner and subject matter expert for product and platform teams, providing technical guidance and mentorship.
- Develop and manage security programs for emerging risks, including SaaS security and AI security.
- 6+ years of experience in security engineering, with hands‑on expertise in both application security and cloud security (AWS strongly preferred).
- Strong proficiency in at least one scripting or programming language (Python or Go preferred) for security automation.
- Demonstrable experience in two or more of the following core areas:
1) Application & SDLC Security, specifically with SAST, DAST, and SCA tools (e.g., Semgrep, Snyk, Burp Suite) and CI/CD automation;
2) Security Automation & Engineering using SOAR platforms (e.g., Tines) and Terraform;
3) Cloud Security (AWS/GCP) with a focus on designing secure cloud‑native services (VPCs, IAM, WAF, CSPM);
4) Identity & Encryption, including JIT access controls, PAM, and cryptographic key life cycles; or
5) Endpoint & Data Security utilizing EDR/XDR, DLP, and MDM solutions. - Experience securing containerized…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).