Back to Jobs

Security Engineer

TrulyRemote Verified

Hand-curated global remote job with direct application link

Technical Requirements

AWS SecurityCloudflareEDRSASTSCAPython

THE ROLE

This is Flox’s first dedicated security hire. You’ll work directly with engineering leadership to stand up security practices that are pragmatic, developer-friendly, and right-sized for a company at our stage. The role is heavily weighted toward doing—you’ll be the one deploying tools, configuring controls, hardening infrastructure, and closing gaps, not just advising others to do so.

That said, you’ll have real input into how we think about controls, priorities, and our security roadmap as we grow. And because our product sits at the heart of the software supply chain—managing dependencies, environments, and build artifacts for some of the world’s largest engineering teams—security isn’t peripheral here. It’s core to the value we deliver.

If you want to build something from scratch, own it end-to-end, and have your work matter immediately, this is that job. If you want a large team, an existing program to slot into, or mostly governance work, it probably isn’t.

WHAT YOU’LL DO

Detection, Monitoring & Response

  • Help evaluate whether to stand up an internal SIEM or work with an outsourced SOC provider—then implement whichever path makes sense for where we are as a company. If building internally: deploy and configure the SIEM, write and tune detection rules, and own the alerting stack. If outsourcing: manage the SOC relationship, define what gets escalated and how, and ensure we’re getting signal not just noise

  • Build incident response runbooks and triage workflows—then actually test them (e.g. test backups in case needed for ransomware recovery)

  • Be the person who sees something and does something about it

Cloud & Infrastructure Security (AWS + Cloudflare)

  • Scan and harden our AWS posture hands-on: IAM policies, SCPs, security group hygiene, GuardDuty, Security Hub, and automated compliance guardrails need to be evaluated and maintained

  • Own Cloudflare configuration across WAF rules, DDoS protection, bot management, Zero Trust access, and DLP policies—keeping rules current and tuned as the product evolves

  • Implement IaC security scanning (Checkov, tfsec, or similar) directly into CI/CD pipelines

  • Own CSPM tooling—configure it, triage it, fix things, don’t just generate reports

Endpoint Protection

  • Deploy and manage endpoint protection across developer systems and production endpoints—covering EDR, device posture, behavior monitoring (including dynamic scans), DLP, and threat detection

  • Ensure developer machines (Mac-heavy environment typical of engineering teams) meet baseline security standards while minimizing friction that slows people down. Understand when and where detective controls suffice vs preventative controls based on thoughtful risk management and defense in depth

  • Define and enforce endpoint compliance policies, including disk encryption, patch posture, and application controls

  • Work with engineering to extend endpoint visibility into production infrastructure where applicable

Software Supply Chain

  • Secure our build and release pipelines

  • Consider SLSA framework adoption and supply chain integrity attestations for our catalog and environments

  • Stand up dependency vulnerability scanning and own the remediation workflow end-to-end for third-party services, libraries, middleware, operating systems, and SaaS

Application Security

  • Integrate SAST and SCA tooling (Semgrep, Snyk, GitHub Advanced Security) into developer workflows

  • Participate in security design reviews and threat modeling for new features

  • Work shoulder-to-shoulder with developers to find and fix vulnerabilities using a risk-based model instead of just vulnerability aging reports

Identity, Access & Entitlements

This is a priority area—but implemented right for a company at our size, not over-engineered for a company ten times larger.

  • Audit and rationalize IAM across AWS, Cloudflare, SaaS applications, and internal tooling; implement the fixes, not just the findings

  • Drive SSO consolidation, enforce MFA universally, and implement least-privilege access in practice, not just policy

  • Build a lightweight, repeatable access review process—something that actually runs on a cadence and produces real decisions

  • Own joiner/mover/leaver processes so that entitlements stay clean as the team grows

  • Evaluate and implement an appropriate identity governance solution for our stage—not an enterprise IGA platform, but something that gives us control and auditability

WHAT WE’RE LOOKING FOR

  • 3–5 years of hands-on security engineering experience, ideally at a software company or cloud-native environment

  • A demonstrable track record of implementing security tools and controls, not just scoping or recommending them

  • Solid working knowledge of AWS security services: IAM, SCPs, GuardDuty, Security Hub, CloudTrail, and related tooling

  • Hands-on experience with Cloudflare—WAF rule management, Zero Trust, DLP, or similar; comfort learning what you haven’t used yet

  • Experience deploying and managing endpoint protection (EDR/MDM) across a mixed developer and production environment

  • Familiarity with software supply chain concepts: SBOMs, dependency management, artifact signing, SLSA

  • Experience integrating SAST, SCA, or DAST tools into CI/CD pipelines

  • Comfort with scripting or light automation (Python, Bash, or similar) to build repeatable processes

  • Ability to work independently, ruthlessly prioritize, and operate without a playbook

  • The kind of person who is bothered when something is insecure and doesn’t wait for someone else to fix it

NICE TO HAVE

  • Familiarity with Nix, package management, or reproducible build systems

  • Experience evaluating or managing an outsourced SOC relationship

  • Prior SIEM deployment or detection engineering experience

  • Experience supporting a SOC 2 or ISO 27001 audit

  • Security certifications (CISSP, OSCP, AWS Security Specialty, etc.)

WHY FLOX

  • First dedicated security hire—you’ll build the program, not inherit someone else’s backlog

  • A product developers genuinely love, which makes working with the engineering team easier

  • Small team, short feedback loops, real ownership—your work will be visible immediately

  • Competitive salary, meaningful equity in a well-funded company, and a flexible hybrid environment

Security Engineer
Flox
Apply