Senior Staff Security Engineer at Voltron Data

We are redirecting you to the source. If you are not redirected in 3 seconds, please click here.

Senior Staff Security Engineer Voltron Data. While the company is remote worldwide, hiring for this position will be focused around the Northeast region (Boston to DC) of the United States, with the aim of hiring in either the NYC or Pittsburgh areas.  Any candidates outside of the core region will require availability in the GMT-5 to GMT-8 time zones (US Eastern Time Zone) Monday through Friday.. Additionally, you must have previous experience working at startups, with a preference for experience at an early-stage startup. Experience working with engineering teams within a software development firm is strongly preferred.. All that can meet these requirements should apply regardless of location.. As a Senior Staff Security Engineer, you’ll be able to protect and secure the Voltron Data and Apache Arrow ecosystems. You'll work as a Tech Lead on the SecOps team and be responsible for application security and compliance initiatives within the company. You will be responsible for the research, architecture, development, and delivery of these focus areas and other security initiatives, either working solo or with other members of the SecOps team. Importantly, we are looking for a Security Engineer who does not work in silos and is willing to share knowledge and responsibilities with other team members, including collaborating with DevOps, IT, and engineering teams for security initiatives. . NOTE: . There will be an expectation of rolling incident response schedule sharing as a part of this role. This will be a shared responsibility with other SecOps and IT members..  . What you will be working on:. Below is a rough timeline of where you can expect to be at different points during your career path starting in this position.. Upon joining and within a month:. Learning and understanding current security processes and tools in use. Growing knowledge of key infrastructure and applications, including their risks for vulnerabilities. Work directly with application developers and build engineers to understand the fundamental architecture of our products to understand how SecOps can integrate and work with these teams.  . Within 3 months:. Coordinating with team members and owners of identified issues to remediate them quickly, detailing findings and process. Building out and tuning our SAST and DAST tooling. Begin working with directors, managers, and team leads to explore building out processes and SLAs. Coordinating with development teams on building and integrating security tooling for new and existing projects.  . After 6 months:. Crafting proposals to address identified risks and improve existing solutions through forward-thinking approaches. Growing responsibilities to own and maintain key aspects of the AppSec tooling, pipelines and/or processes, mentoring others in the future. Evaluating new tools and services for potential use and reporting findings for team review. Prioritizing areas for improvement in our existing processes and proactively addressing them through collaboration with DevOps and relevant teams . Supervising auditing, pen-testing, remediation, and investigations; detailing findings and processes with reports to leadership. Mentoring SecOps team members and continually educating the entire company about good security habits and practices. Identifying areas of opportunity to increase our level of compliance with our existing frameworks and evaluate others as needed by customer and product demands.  . Previous experience: . Familiarity with threat modeling and TTP frameworks (STRIDE, MITRE). Experience as a team lead in Information Security engineering  or application security engineering  and  more than one certification or their equivalents from the list below. A background working with software engineering teams to develop plans for application security and ensure a secure environment. Prior experience with Zero Trust systems and workflows . Experience developing project plans, leading projects, and delivering projects. Prior work with open-source development teams; understanding the vulnerabilities open-source dependencies can bring. Hands-on experience with security tools (Datadog, Crowdstrike, or equivalents) as well as command-line tools for audits, pen-testing, and investigations. Snyk (CLI, Dashboard and IDE integrations) or Equivalent SAST/DAST tooling stack. Experience with navigating earning certifications such as SOC 2, ISO27001, HIPAA, PCI. Familiarity with GDPR, US Data Privacy, and other legal frameworks. Creation of vulnerability remediation systems and workflows   . Linux system administration experience (Ubuntu and CentOS strongly preferred) . Experience with containerized infrastructure and Kubernetes. Worked with cloud services (AWS, Azure, GCP, and/or others) and remote infrastructure in a colocation environment, implementing tailored security controls in each environment. Intermediate proficiency with one of the following languages: Python, C++, or Go. Experience working for a remote company and hands-on exposure with a global remote user base.  . Preferred but not required certifications:. CISSP: Certified Information Systems Security Professional. CISM: Certified Information Security Manager. CEH: Certified Ethical Hacker. CSX-P: CSX Cybersecurity Practitioner. CompTIA Security+. DSOE: DevSecOps Engineering.  . Potential Long-Term Career Paths. SecOps Manager. SecOps Director. US Compensation - . The salary range for this role is between $150,000-$220,000. We have a global market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the exact base pay will vary based on factors such as actual work location, skills and experience of the candidate. This position is also eligible for additional incentives such as equity awards.