About the job
About the Role:
We are seeking a talented and proactive Security Engineer who excels in securing CI/CD pipelines, assessing backend authentication changes, and efficiently handling bug bounty submissions. This role is hands-on and builder-focused — moving beyond mere compliance. You'll be responsible for end-to-end security operations, working closely with our engineering teams on infrastructure, protocols, and platforms.
If you view threat modeling as a collaborative design process rather than a compliance checkbox, you might be the perfect fit. You should only apply if you are willing to work in the office daily alongside our dedicated team!
Key Responsibilities:
Security Operations
Manage daily security operations: monitoring, alerting, triaging, and responding to incidents.
Oversee endpoint security through an EDR system — fine-tuning detections, investigating alerts, and resolving incidents.
Lead the management of identity lifecycles, including employee onboarding/offboarding processes (access provisioning, key rotation, and deprovisioning).
Bug Bounty & Vulnerability Management
Take ownership of our ImmuneFi program — triaging, reproducing, and responding to submissions on a daily basis.
Collaborate closely with protocol and engineering teams to prioritize and track vulnerabilities until they are remediated.
Create internal tools and processes to streamline the bounty workflow for efficiency and consistency.
DevSecOps & Pipeline Hardening
Conduct audits and strengthen CI/CD pipelines — focusing on secrets management, supply chain integrity, and SAST/DAST integration.
Manage dependency security: identify and mitigate vulnerabilities across repositories, including npm dependencies.
Establish and enforce security standards throughout the software development lifecycle (SDLC).
Infrastructure Security
Collaborate with the infrastructure team to review and enhance cloud environments (access controls, network segmentation, least privilege, logging).
Contribute to threat modeling for new systems and architectural changes.
Drive the implementation of cutting-edge security tools and practices.

