This is a remote position.
We are seeking a Senior Security Operations Engineer to join our team. Your role will be to safeguard the company mortgage-tech platform used by thousands of brokers that is growing every month. You will own our 24 7 cyber detection stack automate response playbooks and harden SaaS cloud and endpoint surfaces as we scale.
Responsibilties:
- Detect & Respond Design and run the SIEM/SOAR pipeline create & tune detections across applications drive MTTD/MTTR down command incidents through post-mortem.
- Hardening & Engineering Deploy/manage Zscaler Intune Kandji EDR/AV Google Workspace DLP; build IaC guardrails in AWS; enforce IAM in Okta IE/Auth0 for all business applications.
- Vulnerability & Risk Run scans and remediate scan findings maintain asset & risk registers stay SOC 2 Type II-ready.
- Automation & Purple Teaming Script SOAR workflows (Python / PowerShell / Bash) run purple-team or tabletop exercises and gate code via GitHub Advanced Security/ Defend.
Requirements
- 5 years in Security Operations including 2 years in a senior/lead capacity.
- Deployed & tuned a SIEM for a large number of endpoints or a multi-SaaS estate.
- Built or maintained SOAR playbooks in XSOAR Splunk SOAR Tines or similar.
- Strong cloud and IAM Chops. Administered Okta (or simila Azure AD) for enterprise users (MFA SCIM SSO).
- Led at least one Sev-1/Sev-2 incident through root cause and written post-mortem.
- Acted as security-ops point person during a SOC 2 ISO 27001 or comparable audit.
- Scripting ability (Linux Python or PowerShell).
- Any senior credentials (CISSP GCIA GCIH OSCP or similar) are plus. Bonus points for secure SDLC experience.
Benefits
- Work Location: Remote
- 5 days working
5+ years in Security Operations, including 2 years in a senior/lead capacity. Deployed & tuned a SIEM for a large number of endpoints or a multi-SaaS estate. Built or maintained SOAR playbooks in XSOAR, Splunk SOAR, Tines or similar. Strong cloud and IAM Chops. Administered Okta (or simila Azure AD) for enterprise users (MFA, SCIM, SSO). Led at least one Sev-1/Sev-2 incident through root cause and written post-mortem. Acted as security-ops point person during a SOC 2, ISO 27001 or comparable audit. Scripting ability (Linux, Python or PowerShell). Any senior credentials (CISSP, GCIA, GCIH, OSCP, or similar) are plus. Bonus points for secure SDLC experience.