About the job
About Us
At Turnkey, we develop secure, developer-centric infrastructure for private key management, simplifying the process of creating wallets, signing transactions, and automating on-chain actions through a single, elegant API—without ever compromising sensitive key material.
Our mission is to fortify the open internet by making strong cryptography and key management the standard. Founded by the team behind Coinbase Custody, the world’s largest and most secure cryptocurrency custodian, our work has safeguarded over $100 billion in crypto assets across the industry.
Our team embodies a culture of low ego, high agency, and autonomy, bringing over 100 years of combined expertise in cryptography, security, and low-level systems, building robust infrastructure designed for scalability.
Role Overview
We are on the lookout for a Senior Corporate Security Engineer to spearhead and enhance the security of Turnkey's corporate infrastructure. This is a pivotal role as you will be our first dedicated corporate security hire, collaborating directly with the security lead to establish enterprise security capabilities from the ground up.
In this capacity, you will safeguard Turnkey’s personnel, endpoints, SaaS applications, identity systems, and internal infrastructure, ensuring the security of our distributed workforce while enabling rapid progress without compromising safety. Operating at the intersection of security engineering, IT operations, and risk management, you will design and implement security controls that are robust yet user-friendly, ensuring our company remains secure as we grow.
What You’ll Do
Build & Secure Corporate Infrastructure
Architect, implement, and oversee security measures for endpoints and distributed systems; deploy and manage our security stack (MDM, EDR/XDR, ZTNA, SSO); enforce zero-trust principles, least-privilege access, and hardening standards.
Drive Security Initiatives & Risk Reduction
Lead initiatives focused on endpoint hardening, access controls, and vendor risk; conduct security design reviews, risk assessments, and vulnerability remediation; develop and enforce security policies and best practices.
Detection, Response & Automation
Respond to security incidents with urgency and technical expertise; collaborate on detection rules, alerts, and monitoring; automate workflows and create runbooks and playbooks to efficiently scale security operations.

