Design, implement, and manage the integration of security tooling into CI/CD pipelines.
Develop and maintain automation scripts to streamline security processes and workflows.
Own the vulnerability management lifecycle: identification, triage, prioritization, and reporting.
MoonPay is a unified payments platform for digital currency, making it easy for anyone to buy, sell, swap, and pay in digital currencies. Trusted by over 30 million customers and over 500 ecosystem partners, MoonPay's secure, enterprise-grade platform is driving mainstream crypto adoption worldwide.
Execute and manage vulnerability scanning of internal, external, and cloud assets
Plan, design, and implement enterprise vulnerability scanning infrastructure in a hybrid or multi-cloud architecture
Analyze vulnerabilities and clearly communicate impact and risk to the organization
GuidePoint Security provides trusted cybersecurity expertise, solutions, and services. They help organizations make better decisions and minimize risk with over 1,200 employees, establishing strategic partnerships with leading security vendors, and serving as a trusted advisor to more than 6,200 customers.
Conduct regular vulnerability scanning of networks, servers, endpoints and applications.
Prioritize vulnerabilities based on CVSS scores, threat intelligence, and asset criticality.
Partner with IT infrastructure, application development, cloud, and network teams to remediate risks.
Connexus Credit Union serves members across all 50 states. They are a remote first employer with employees in the upper Midwest, and they foster collaboration and high performance.
Help scale NerdWallet’s application security program through automation, tooling, and developer enablement.
Partner with engineering and product teams to identify and remediate security gaps across multiple systems while balancing business priorities.
Build tools, processes, and automation that improve security posture visibility for engineers and leadership.
NerdWallet aims to bring clarity to life's financial decisions with a team of exceptional Nerds. They foster an inclusive, flexible, and candid culture where employees are empowered to grow and take risks, supporting well-being and development whether working remotely or in-office.
Own and enforce DevSecOps practices across CI/CD pipelines.
Drive vulnerability identification, triage, and remediation across infrastructure and applications.
Act as the primary security SME for the engineering organization.
Teramind is pioneering a predictive, AI-driven approach to safeguarding organizations' people, data, and operations. As a global leader in user behavior analytics, insider risk management, and workforce intelligence, we empower businesses to transform data into a strategic asset.
Identifying opportunities to eliminate manual security workflows and replace them with scalable, automated solutions
Building internal tools and integrations that automate processes such as vulnerability triage and prioritization, alert enrichment and routing, and GRC evidence collection
Partnering with security and engineering stakeholders to understand pain points and translate them into practical technical solutions
Calendly's products are currently relied upon by millions. They are in the midst of exciting product growth, making joining at this time a fantastic opportunity. They hope Calendly can be part of your professional journey, allowing you to learn, grow, and do your best work alongside the best people.
Build AI agents that handle vulnerability triage, automated security reviews of PRs, and initial incident forensics at scale.
Build systems that automatically detect and remediate security gaps across AWS, GCP, and Azure -- configuration drift, IAM misconfigurations, vulnerable dependencies, exposed secrets.
Lead threat modeling, security reviews, and risk assessments across web applications, APIs, and services.
Atlan is building the missing context layer for data and AI, helping enterprises close the AI value chasm. They connect to every part of the modern data and AI stack to unify this context into a single, shared layer that both humans and AI agents can rely on.
Embed security into CI/CD pipelines and own secure controls.
Lead the process of vulnerability and patch management, automating discovery.
Strengthen cloud and Kubernetes environments through secure configurations.
Alpaca is a US-headquartered self-clearing broker-dealer and brokerage infrastructure provider for stocks, ETFs, options, crypto, fixed income, and more. They are a dynamic team of 230+ globally distributed members committed to opening financial services to everyone.
Participate in threat modeling exercises with engineering team members
Triage SCA/SAST/DAST/CSPM findings by eliminating false positives and providing well-vetted vulnerabilities to engineering teams
Support vulnerability management efforts for networks and infrastructure
They offer a SaaS-based Global Employment Platform that enables clients to expand into over 180 countries. Their diverse, remote-first teams are essential to their success, fostering innovation and valuing every contribution.
Own and evolve vulnerability management end-to-end.
Embed secure design principles across mobile applications, APIs, and microservices.
Partner closely with engineering teams to remediate security issues.
Smart Working connects skilled professionals with global teams for full-time, long-term roles. They help you discover meaningful work with teams that invest in your success, where you’re empowered to grow personally and professionally.
Assess information security processes and design more efficient methods using available tools including generative AI
Oversee the Implementation and management of Infosec applications, services and tools such as Endpoint Detection and Response (EDR)
Conduct security, vulnerability, and risk assessments across services, cloud and applications, using both automated tools, manual testing procedures, and generative AI
KnowBe4 is the global leader in Human Risk Management, trusted by over 70,000 organizations worldwide to secure their employees and AI agents for over 15 years. Their HRM+ combines continuous risk intelligence, advanced technical defenses, and personalized training to help organizations build strong security cultures.
Assist in designing and maintaining secure infrastructure on EKS in our multi-cloud environment (AWS) using Infrastructure as Code (Terraform).
Write code (Python, Go, or Bash) to automate manual tasks, threat detection, and vulnerability management processes.
Integrate security tools (SAST, DAST, SCA) into our CI/CD pipelines, ensuring developers receive fast, actionable feedback on their code.
Smartsheet helps people and teams achieve anything with seamless work management and scalable solutions. They empower teams to automate the manual, uncover insights, and scale smarter, creating space for impactful work. The company values diverse perspectives and supports employee growth.
Conduct regular vulnerability assessments, threat modeling, and security architecture and design reviews.
Partner with engineering teams to identify, prioritize, and mitigate identified risks
Design and implement proactive security solutions to systematically eliminate vulnerability classes rather than endlessly chase individual vulnerabilities
Oura's mission is to empower every person to own their inner potential. Its award-winning products help its global community gain a deeper knowledge of their readiness, activity, and sleep quality by using their Oura Ring and its connected app. The company is quickly growing and focused on helping people live healthier and happier lives, and ensures that its team members have what they need to do their best work — both in and out of the office.
Lead security architecture and design reviews across applications, infrastructure, and integrations.
Conduct and coordinate penetration testing, threat modeling, and security reviews.
Design and implement security automation within CI/CD pipelines.
Assured modernizes insurance by providing software solutions to large insurers that help them win in a technology-driven world. Their products include self-service claim-filing software to backend fraud detection and are dynamic, collaborative, and rewarding.
Own and drive the company’s security strategy, roadmap, and overall posture
Lead threat modeling, secure code reviews, and architecture reviews
Build and maintain security tooling, automation, and infrastructure as code
Seesaw's mission is to provide every elementary student with joyful and connected learning experiences that lay the foundation for success in life. Trusted and loved by 25 million educators, students, and families worldwide, Seesaw is the only elementary learning experience platform.
Responsible for supporting the integration of security, automation, and operational controls into development and deployment pipelines to enable secure, reliable delivery of MODES III systems.
Supports development, implementation, and maintenance of CI/CD pipelines that integrate security, testing, and compliance controls.
Assists with automation of build, deployment, and configuration processes to improve reliability, repeatability, and deployment efficiency.
Peraton is a next-generation national security company that drives missions of consequence spanning the globe. As the world’s leading mission capability integrator and transformative enterprise IT provider, they deliver trusted, highly differentiated solutions and technologies.
Design, develop, and implement cloud security architecture solutions in Microsoft Azure.
Build and maintain security automation using Infrastructure as Code (IaC) tools.
Collaborate with development and platform engineering teams to embed security into CI/CD pipelines.
Hanger, Inc. is the world's premier provider of orthotic and prosthetic (O&P) services and products, offering the most advanced O&P solutions, clinically differentiated programs and unsurpassed customer service. With 160 years of clinical excellence and innovation, Hanger's vision is to lead the orthotic and prosthetic markets by providing superior patient care, outcomes, services and value.
Helping define the security operations roadmap by designing and implementing long term strategies
Improve and maintain processes, tooling, documentation and training to mature and enhance cybersecurity incident response
Design, implement and maintain security events monitoring systems
Docplanner empowers patients by giving them access to leave and read reviews about their visit and also provides doctors with the technology to manage bookings easily and save time. They are leaders in 13 countries with over 2,500 employees globally, maintaining a startup-mindset.
Design, implement, and sustain security architecture across AWS GovCloud.
Execute and maintain RMF activities across all system components.
Implement, validate, and continuously maintain DISA STIG compliance across all infrastructure components.
Foxhole Technology provides robust cybersecurity and IT support capabilities for federal civilian and defense agencies. A recognized leader in navigating technology and security challenges, Foxhole delivers mission-focused innovations to answer evolving and complex needs.
Lead the security Capabilities we bring to market, owning the layered defense strategy gained by combining multiple data sources
Convert application and endpoint vulnerability research + findings into actionable preventive and remediation actions by generating security software engineering requirements
Translate CVE & vendor hardware/software vulnerability research into security product development
Huntress is a fully remote, global team of passionate experts on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products.