Security Engineer
Skills
About the Role
You will execute the technical implementation of a modern, cloud-native security stack and deliver production‑grade controls. You will design, deploy, and maintain identity, endpoint, cloud, and application protections (SSO/MFA, MDM, EDR, CSPM, secrets and DLP). You will build monitoring and detection coverage, investigate alerts, lead incident response, run vulnerability scanning and patch workflows, and maintain inventories of non-human identities. You will automate evidence collection and security workflows to produce auditor‑credible artifacts and support audits and GRC efforts. You will also support employee onboarding and offboarding, produce clear security documentation and runbooks, and provide hands‑on technical security support under the direction of the CISO.
Requirements
- 3+ years of hands‑on security engineering experience in a cloud‑native environment
- Experience implementing and administering identity and access management platforms
- Hands‑on experience with AWS security services (IAM, CloudTrail, GuardDuty, Security Hub, Secrets Manager)
- Working knowledge of cloud security posture management tools (Wiz, Prisma Cloud, Prowler, or equivalent)
- Experience integrating SAST/SCA tooling into CI/CD pipelines and managing vulnerability remediations
- Ability and willingness to produce audit‑quality security documentation and evidence artifacts
- Understanding of AI's role in the security stack and willingness to implement AI‑driven processes
- Comfortable operating in a high‑autonomy, high‑accountability environment with executive visibility
- Preferred: experience supporting SOC 2 audits end‑to‑end and familiarity with GRC platforms (Vanta, Drata, SecureFrame)
- Preferred: scripting experience for security automation and exposure to DLP tooling or AI data governance
- Preferred: familiarity with NIST CSF, NYDFS Part 500, or equivalent regulatory frameworks
- Preferred: AWS Solutions Architect, AWS Certified Security, or CISSP certifications (not required)
Responsibilities
- Design, deploy, and maintain core security controls across identity, endpoint, cloud, and application layers
- Integrate and configure security tooling to produce auditor‑credible evidence
- Build and maintain detection coverage across cloud and endpoints
- Monitor alerts, investigate incidents, and deliver structured updates
- Lead vulnerability management lifecycle including scanning, triage, remediation tracking, and verification
- Maintain inventory and lifecycle of non‑human identities and secrets
- Identify and implement automation for controls, alerting, evidence collection, and workflows
- Collect, organize, and maintain audit evidence and artifacts
- Support security onboarding and offboarding, including device enrollment and access provisioning
- Document security configurations, SOPs, and remediation efforts
