wagey.ggwagey.ggv1.0-e93b95d-4-May
Browse Tech JobsCompaniesFeaturesPricingFAQs
Log InGet Started Free
Jobs/Security Engineer Role/flox - Security Engineer
Pro members applied to this job 36 hours before you saw itGet Pro ›
flox

flox - Security Engineer

United States$19k - $19k+ Equity5d ago
RemoteMidNASenior CareCloud ComputingSecurity EngineerRisk ManagementReportingCloudflareBashPython

Upload My Resume

Drop here or click to browse · Tap to choose · PDF, DOCX, DOC, RTF, TXT

Apply in One Click
Apply in One Click

Requirements

• 3–5 years of hands-on security engineering experience, ideally at a software company or cloud-native environment • A demonstrable track record of implementing security tools and controls, not just scoping or recommending them • Solid working knowledge of AWS security services: IAM, SCPs, GuardDuty, Security Hub, CloudTrail, and related tooling • Hands-on experience with Cloudflare—WAF rule management, Zero Trust, DLP, or similar; comfort learning what you haven’t used yet • Experience deploying and managing endpoint protection (EDR/MDM) across a mixed developer and production environment • Familiarity with software supply chain concepts: SBOMs, dependency management, artifact signing, SLSA • Experience integrating SAST, SCA, or DAST tools into CI/CD pipelines • Comfort with scripting or light automation (Python, Bash, or similar) to build repeatable processes • Ability to work independently, ruthlessly prioritize, and operate without a playbook • The kind of person who is bothered when something is insecure and doesn’t wait for someone else to fix it • Familiarity with Nix, package management, or reproducible build systems • Experience evaluating or managing an outsourced SOC relationship • Prior SIEM deployment or detection engineering experience • Experience supporting a SOC 2 or ISO 27001 audit • Security certifications (CISSP, OSCP, AWS Security Specialty, etc.)

Responsibilities

• Detection, Monitoring & Response • Help evaluate whether to stand up an internal SIEM or work with an outsourced SOC provider—then implement whichever path makes sense for where we are as a company. If building internally: deploy and configure the SIEM, write and tune detection rules, and own the alerting stack. If outsourcing: manage the SOC relationship, define what gets escalated and how, and ensure we’re getting signal not just noise • Build incident response runbooks and triage workflows—then actually test them (e.g. test backups in case needed for ransomware recovery) • Be the person who sees something and does something about it • Cloud & Infrastructure Security (AWS + Cloudflare) • Scan and harden our AWS posture hands-on: IAM policies, SCPs, security group hygiene, GuardDuty, Security Hub, and automated compliance guardrails need to be evaluated and maintained • Own Cloudflare configuration across WAF rules, DDoS protection, bot management, Zero Trust access, and DLP policies—keeping rules current and tuned as the product evolves • Implement IaC security scanning (Checkov, tfsec, or similar) directly into CI/CD pipelines • Own CSPM tooling—configure it, triage it, fix things, don’t just generate reports • Endpoint Protection • Deploy and manage endpoint protection across developer systems and production endpoints—covering EDR, device posture, behavior monitoring (including dynamic scans), DLP, and threat detection • Ensure developer machines (Mac-heavy environment typical of engineering teams) meet baseline security standards while minimizing friction that slows people down. Understand when and where detective controls suffice vs preventative controls based on thoughtful risk management and defense in depth • Define and enforce endpoint compliance policies, including disk encryption, patch posture, and application controls • Work with engineering to extend endpoint visibility into production infrastructure where applicable • Software Supply Chain • Secure our build and release pipelines • Consider SLSA framework adoption and supply chain integrity attestations for our catalog and environments • Stand up dependency vulnerability scanning and own the remediation workflow end-to-end for third-party services, libraries, middleware, operating systems, and SaaS • Application Security • Integrate SAST and SCA tooling (Semgrep, Snyk, GitHub Advanced Security) into developer workflows • Participate in security design reviews and threat modeling for new features • Work shoulder-to-shoulder with developers to find and fix vulnerabilities using a risk-based model instead of just vulnerability aging reports • Identity, Access & Entitlements • This is a priority area—but implemented right for a company at our size, not over-engineered for a company ten times larger. • Audit and rationalize IAM across AWS, Cloudflare, SaaS applications, and internal tooling; implement the fixes, not just the findings • Drive SSO consolidation, enforce MFA universally, and implement least-privilege access in practice, not just policy • Build a lightweight, repeatable access review process—something that actually runs on a cadence and produces real decisions • Own joiner/mover/leaver processes so that entitlements stay clean as the team grows • Evaluate and implement an appropriate identity governance solution for our stage—not an enterprise IGA platform, but something that gives us control and auditability

Benefits

• First dedicated security hire—you’ll build the program, not inherit someone else’s backlog • A product developers genuinely love, which makes working with the engineering team easier • Small team, short feedback loops, real ownership—your work will be visible immediately • Competitive salary, meaningful equity in a well-funded company, and a flexible hybrid environment

Get Started Free

No credit card. Takes 10 seconds.

Privacy·Terms··Contact·FAQ·Wagey on X