Senior Information Security Engineer

MX

Not Interested
Bookmark
Report This Job

profile Job Location:

Lehi, UT - USA

profile Monthly Salary: Not Disclosed
Posted on: Yesterday
Vacancies: 1 Vacancy

Job Summary

Life at MX

We are driven by our moral imperative to advance mankind - and it all starts with our people product and purpose. We always carry a deep sense of drive and passion with us. If you thrive in a challenging work environment surrounded by incredible team members who will help you grow MX is the right place for you.

Come build with us and be part of an award-winning company thats helping create meaningful and lasting change in the financial industry.

Role Overview

The Senior Security Engineer is a senior individual contributor role focused on being the primary hands-on builder technical lead and implementer of MXs security program. This position is designed for a self-starting technical lead with deep execution expertise in ubiquitous shift-left security application protection and automated risk reduction. In addition to the focus on shift-left security this role will have Web Application and API Protection (WAAP) and Network Security focuses to drive widespread adoption of secure practices across engineering teams.

Reporting directly to the Director of Security Architecture and Engineering and working closely with Cloud & Product Security Architecture to execute defined designs the Senior Security Engineer leads the deployment automation and maturation of security controls at scale. They serve as the go-to technical expert for implementation troubleshoot complex issues mentor engineers organization-wide and champion best practices to embed security deeply into infrastructure platforms and application workflows. This role influences Cloud Engineering DevOps Platform Application Development and Security Operations teams to operationalize secure-by-design principles while maintaining alignment with compliance and risk requirements.

Responsibilities

Application & API Security

  • Serve as the primary hands-on builder for Fastly Next-Gen WAF (Signal Sciences) across all production environments to mitigate web-based attacks with low false positives.

  • Lead the deployment and tuning of Cequence Unified API Protection for API discovery behavioral abuse detection and real-time runtime enforcement.

  • Standardize API security patterns across the organization ensuring deep visibility into shadow APIs and automated blocking of malicious traffic.

  • Partner with application teams to integrate threat modeling and security requirements into the design phase of new features.

  • Detect & Prevent credential-stuffing attacks ensuring Security Engineering is First-To-Know (FTK)

Enterprise CI/CD Security & Shift-Left Enforcement

  • Implement and mature policy-as-code frameworks (OPA/Rego or equivalents) tied to organizational guardrails.

  • Enforce strict CI/CD quality gates that block critical and high-severity vulnerabilities from reaching production using SAST/SCA tools like Snyk Semgrep or CodeQL.

  • Drive integration of security scanning tools (IaC containers secrets dependencies SBOM) into CI/CD pipelines and evangelize shift-left practices to development teams.

  • Train and enable engineers to build securely from the start reducing misconfigurations at the source.

Web App & Api Protection (WAF & Firewall with IPS/IDS)

  • Deploy and manage AWS Network Firewall & Suricata IPS/IDS rules (or similar e.g. PAN) as code through Terraform to protect ingress egress and east-west traffic.

  • Implement and maintain advanced network security controls including VPC Service Controls and hierarchical policies.

  • Develop and tune detection rules for Network Security Services partnering with SIEM owner; support threat hunting and incident investigations

Container & Kubernetes Security

  • Implement and enforce security controls for Kubernetes clusters (EKS GKE or self-managed) including cluster hardening admission controls and network policies.

  • Drive system hardening across container layers: secure base images runtime protection (e.g. CrowdStrike) image signing/verification and vulnerability management.

  • Integrate container security scanning (image vulnerability misconfiguration SBOM) into build pipelines; enforce runtime protections and least-privilege for workloads.

  • Develop and automate guardrails for Kubernetes configurations using tools like Crowdstrike OPA/Gatekeeper or Kyverno to prevent insecure deployments.

Secrets Management & Secret Hygiene

  • Enforce a strict zero-secrets-in-code policy through pre-merge blocking using tools like GitGuardian TruffleHog or Gitleaks.

  • Lead the migration of legacy secrets to centralized stores such as HashiCorp Vault AWS Secrets Manager or Sealed Secrets.

Software Supply Chain Security

  • Standardize SBOM (Software Bill of Materials) generation for all internal and third-party software artifacts.

  • Implement the SLSA framework (or similar) to ensure the integrity of build pipelines and artifact provenance.

  • Deploy artifact signing and verification using Sigstore/Cosign (or similar) to ensure only trusted code runs in production.

  • Govern dependency usage to proactively block compromised or typosquatted packages from entering the ecosystem.

System & Host Hardening (CIS & Golden Images)

  • Standardize the creation of Golden Images (AMIs/Base Images) based on CIS Benchmarks for all compute resources.

  • Eliminate configuration drift by implementing automated remediation workflows for non-compliant hosts.

  • Deploy and manage host-based security telemetry (CrowdStrike Falcon) across the entire fleet.

  • Scale immutable infrastructure patterns that remove the need for manual system patching.

Cloud & Infrastructure Security

  • Translate architectural designs into production-ready deployments using Terraform automation and repeatable processes.

  • Lead deployment and management of CrowdStrike Falcon Complete (CSPM/CNAPP) for posture management misconfiguration remediation and drift detection.

  • Enforce cloud governance standards through automated baselines templates and least-privilege controls across all accounts.

  • Prototype and validate new controls or tools to accelerate organizational rollout.

  • Deploy Just-In-Time (JIT) identity systems and enforce the principle of least privilege.

  • Accomplish task-based short-lived access eliminating the need for standing privileges.

  • Experience enforcing Principle of Least Privilege (PoLP) on non-human identities (NHI).

Qualifications

  • 7 years of progressive hands-on experience in application security cloud security engineering or DevSecOps at scale.

  • Expert-level implementation experience with Fastly Next-Gen WAF (Signal Sciences) and Cequence Unified API Protection (or equivalent tools).

  • Expert in Terraform for secure infrastructure-as-code; strong experience with policy-as-code (OPA/Rego).

  • Deep hands-on expertise with CNAPP/CSPM platforms (CrowdStrike Horizon Prisma Cloud) and cloud-native detection tools.

  • Proven ability to operate in multi-cloud environments with a strong grasp of Zero Trust identity and secure workload patterns.

  • Experience building and automating controls in regulated environments such as SOC 2 PCI DSS or ISO 27001.

  • Excellent communication and influence skills: able to teach persuade and enable engineers at all levels.

  • Track record of mentoring others and driving adoption of best practices across organizations.

  • Experienced Incident Responder with a proven history of leading security incidents such as those related to credential leaks or credential stuffing attacks from beginning to end.

What Success Looks Like

  • Critical High vulnerabilities are blocked at the PR stage resulting in a measurable reduction in production security debt.

  • Manual secrets are eliminated from all codebases and replaced with automated rotated credentials.

  • Security infrastructure is deployed entirely as code with zero manual configuration drift in production environments.

  • Engineering teams view security as an enabler adopting paved road patterns that make the secure way the easiest way reducing friction and toil.

At MX we are a high-performance organization that thrives on trust and results. This role is based in Lehi Utah with flexibility for both in-office and remote work. We believe in empowering our team members to deliver exceptional outcomes while taking advantage of our incredible office space when it best supports their work. Our Utah office features onsite perks such as company-paid meals massage therapists a sports simulator gym mothers lounge and meditation room and meaningful interactions with amazing people. We encourage team members to come together in the office to collaborate kick off key projects or strategize cross-functionally fostering connection and innovation.

MX is proudly committed to recruiting and retaining a diverse and inclusive workforce. As an Equal Opportunity Employer we never discriminate based on race religion color national origin gender (including pregnancy childbirth or related medical conditions) sexual orientation gender identity gender expression age military or veteran status status as an individual with a disability or other applicable legally protected characteristics. We particularly welcome applications from veterans and military spouses. All your information will be kept confidential according to EEO guidelines. You may request reasonable accommodations by sending an email to


Required Experience:

Senior IC

Life at MXWe are driven by our moral imperative to advance mankind - and it all starts with our people product and purpose. We always carry a deep sense of drive and passion with us. If you thrive in a challenging work environment surrounded by incredible team members who will help you grow MX is th...
View more view more

Key Skills

  • International Development
  • Access Control System
  • Finance Control
  • Informatica
  • Information Technology Sales
  • Asp.Net MVC