About UsAt Heidi Health, we believe healthcare deserves a consistent, compassionate rhythm that prioritizes patient care. Our innovative AI Care Partner collaborates with clinicians to enhance their ability to deliver meaningful care.We are a diverse team composed of doctors, engineers, designers, researchers, and creatives dedicated to creating tools that empower healthcare professionals to focus entirely on their patients.In just 18 months, Heidi has returned over 18 million hours to healthcare workers, facilitating 73 million patient interactions across 116 countries. Currently, more than two million patient visits each week worldwide are powered by our technology.With nearly $100 million in funding, we are expanding our reach in the US, UK, Canada, and Europe, partnering with leading healthcare systems such as NHS, Beth Israel Lahey Health, and Monash Health.Your ResponsibilitiesDesign and sustain high-quality detection systems across cloud, infrastructure, and application layers.Enhance logging and audit mechanisms: managing what data we collect, how we standardize it, the duration of retention, and querying methods.Create automated response strategies: including playbooks, orchestration, and standardized containment and remediation procedures.Refine investigative processes for incidents: focusing on evidence management, timelines, and actionable insights.Collaborate with platform and application teams to implement essential security telemetry and abuse detection signals.Conduct threat hunting initiatives that yield tangible enhancements to detection capabilities and controls.Contribute to the broader security program by integrating learning from incidents, threat models, detection coverage, and preventive measures.What We SeekWe are on the lookout for candidates with senior to staff-level expertise, showcasing autonomy, depth of knowledge, and the ability to amplify impact.Accountable for detection and response outcomes from start to finish, including prioritizing initiatives and making roadmap decisions.In-depth understanding of attacker behaviors, audit logging, and the trade-offs between detection coverage and false positives.Proficient in developing scalable systems and workflows (e.g., detection-as-code, automation, reliable operations).Able to operate independently during incidents, coordinate team efforts, and drive subsequent improvements.An effective communicator who can articulate technical findings into strategic priorities and preventive actions.
Feb 5, 2026