Security Engineer
Listed on 2026-03-01
-
IT/Tech
Cybersecurity, Systems Engineer, Network Security
About Etched
Etched is building the world’s first AI inference system purpose‑built for transformers - delivering over 10x higher performance and dramatically lower cost and latency than a B200. With Etched ASICs, you can build products that would be impossible with GPUs, like real‑time video generation models and extremely deep & parallel chain‑of‑thought reasoning agents. Backed by hundreds of millions from top‑tier investors and staffed by leading engineers, Etched is redefining the infrastructure layer for the fastest growing industry in history.
Job SummaryAt Etched, building and maintaining a secure yet friction‑free computing environment is central to our mission. As a Security Engineer, you will protect the networks, systems, and applications that enable our engineers to push the limits of AI hardware. You will design, implement, and operate the monitoring, detection, and response infrastructure that safeguards Etched’s intellectual property, high‑performance compute clusters, and developer workflows across both on‑prem and cloud environments.
You will partner with infrastructure, IT, application, and external provider teams to build systems that are secure by design, resilient under pressure, and seamless and easy to use for the end users.
This role combines hands‑on technical depth with a focus on scalability and automation. You will take ownership of Etched’s security posture across infrastructure, IT, and applications, driving proactive threat detection, real‑time monitoring, and rapid incident response. Your decisions will always balance maintaining full firm‑wide velocity while improving our security and defense posture. You will develop tools, automation, and workflows that evolve with our rapidly growing and expanding footprint and ensure that security enhances, rather than hinders, innovation.
If you are motivated by precision, ownership, and impact, you will find Etched the ideal place to advance your craft and contribute to the future of AI computing.
- Manage and harden security baselines across on‑prem, hybrid, and cloud systems, ensuring strong protection while maintaining speed and usability.
- Integrate telemetry, logging, tracing, and management of structured, semi‑structured, and unstructured data across the entire environment to provide unified and comprehensive observability into infrastructure and application activity.
- Lead vulnerability management, patching, and configuration assurance programs to reduce exposure and maintain a consistent security posture.
- Partner with infrastructure, IT, and application teams to strengthen identity, access, and network security through Okta, Google Workspace, and FreeIPA.
- Implement and maintain zero‑trust network architectures, SASE controls, CASB solutions, and conditional access policies that protect both users and data across environments to ensure full access and full control of our data and IP regardless of location or device.
- Operate and enhance security operations tooling, including SIEM, SOAR, and EDR/XDR platforms, to ensure comprehensive monitoring and rapid detection of threats.
- Develop and tune detection logic, automation, and playbooks for identifying and responding to threats such as insider activity, lateral movement, and anomalous behavior.
- Investigate and respond to security incidents, performing root‑cause analysis, containment, and remediation while coordinating with engineering and IT.
- Build automation, scripts, AI agents, and integrations that streamline monitoring, alerting, and remediation workflows to improve efficiency and reliability.
- Establish metrics, dashboards, and feedback mechanisms to measure detection coverage, response time, and overall security health.
- Promote a culture of security awareness and ownership across engineering teams, ensuring that protection and productivity advance together.
- Implementing a centralized security telemetry pipeline that aggregates logs and signals from networks, compute clusters, storage, endpoints devices, build systems, and cloud services into a unified SIEM for improved detection coverage.
- Designing and developing Security…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).