Sr. Application Security Engineer
Upload My Resume
Drop here or click to browse · PDF, DOCX, DOC, RTF, TXT
Requirements
• Technical Ability: Solid data analysis skills including writing SQL queries, experience writing detections, responding to security incidents, and the ability to parse through large datasets. • Security Domain Expertise: A successful candidate should be intimately familiar with modern adversary behavior and techniques and understand how to leverage data sources to identify them. • Collaboration & Communication: We take pride in being a transparent security team that works hard to find ways to say "yes" and enables Material to grow quickly and securely. As a Security Engineer, you'll be working closely with software engineers, data scientists, and product managers. This requires a collaborative spirit and great communication skills. • Ownership: We love security engineers who deeply care about the impact of their work and find satisfaction in a job well done. The Security Team at Material is passionate about building things in a first-class manner and avoiding shortcuts that accrue technical debt and increase toil across the team. We expect candidates to understand how to build and implement tooling to be robust and resilient. • Breadth & Growth: Being a great security engineer means continually learning new and more advanced techniques in your field, but also gaining a breadth of skills to bridge the gaps in getting things done. Whether it is improving your software development abilities, becoming an expert in a specific security subdomain, product management, or customer care, you have the drive to learn more and more. • Material Security is a remote-first workplace with an office in San Francisco, California. • By clicking "Apply for this Job", you acknowledge that you have read the California Candidate Privacy Notice Regarding Use of Personal Information and hereby agree to its terms.
Responsibilities
• Lead AppSec Strategy: Own the end-to-end security of the Material application, from design and threat modeling to deployment. • Vulnerability Management: Secure our dependency supply chain while working directly with engineering. • Build Security Tooling: Develop internal automation to detect and block abuse patterns and streamline security workflows (e.g., JIT access, dependency scanning). • Code & Architecture Review: Perform deep-dive security audits and code reviews for new and existing product features. • Infrastructure Security: Partner with the infrastructure team to harden our Kubernetes deployments and cloud environments (GCP).