Menlo Security's mission is enabling the world to connect, communicate and collaborate securely without compromise. We support customers across various enterprises including Fortune 500 companies, 9/10 of the largest global banks, and the Department of Defense. Menlo is well-funded for growth and our investors include Vista Equity Partners, General Catalyst, JPMC, American Express, HSBC, and Ericsson Ventures. Our culture is collaborative, inclusive, and fun! We have five core values: Stay Aligned, Get It Done, Customer Empathy, Think Creatively, and Help Each Other Out.
Security Engineer
Location
United States
Posted
10 days ago
Salary
$105K - $185K / year
Seniority
Mid Level
Job Description
Role Description
We are seeking a forward-thinking Security Engineer to join our team, focusing on SecOps for the cloud architecture supporting the product. In this role, you will operate across a complex, multi-cloud environment (AWS & GCP) comprising both traditional VMs and modern managed and unmanaged container-based architectures.
Your primary focus will be on the aggressive automation of security processes, responsible for:
- Deploying, integrating, and monitoring Jenkins and GitLab pipelines to ensure that "Security as Code" scales seamlessly alongside our infrastructure.
- Strategic deployment and management of CSPM, CNAPP, and CWPP tools to act as a force multiplier for the team.
- Conducting rigorous infrastructure reviews to ensure that cloud configurations, IAM policies, and orchestration layers meet our security baselines while maintaining rapid release velocity.
Qualifications
- Deep architectural understanding of GCP and AWS, with the ability to manage complex IAM policies, standardizing identity, and securing networking layers across both providers.
- Proficiency in Python, Go, or Bash to write custom scripts that eliminate toil, build auto-remediation playbooks, and streamline security operations.
- Experience developing secure Terraform modules and primitives for the organization to stem from, ensuring security defaults are baked into the architecture and catching misconfigurations before deployment.
- Design and maintain shared CI/CD security components (SAST/SBOM/Container Scanning) that are easily adoptable by engineering teams with minimal friction.
- Proven experience securing managed (EKS, GKE) and unmanaged container workloads, with a strong emphasis on automating runtime defenses and admission controllers.
- The ability to operate pragmatically within a lean team, knowing how to prioritize risk based on runtime context and business impact rather than just chasing scanner outputs.
- Proven ability to implement and manage Just-In-Time access policies to replace manual ticket and eliminating standing privileges.
- Due to the role’s involvement in federal compliance activities, the candidate is required to be a US citizen.
Requirements
- Deploy and manage Cloud Security Posture Management (CSPM) tools to automatically detect and remediate misconfigurations across both providers.
- Implement Cloud Native Application Protection Platform (CNAPP) strategies by shifting left and integrating container image scanning directly into Jenkins and GitLab pipelines.
- Deploy and tune Cloud Workload Protection Platform (CWPP) tools to monitor runtime behavior and detect anomalies in both VMs and Kubernetes pods.
- Build Automated Response Playbooks to automatically enrich alerts, isolate compromised resources, and dismiss low-fidelity noise without human intervention.
- Manage effective permissions across complex multi-cloud IAM structures and standardize secret management workflows.
- Collaborate closely with Technical Program Managers (TPMs) during software releases to enforce compliance standards and oversee vulnerability scanning.
- Respond to customer inquiries regarding the impact of Common Vulnerabilities and Exposures (CVEs) on our product.
Benefits
- Base Salary range for this role is $105,000 - $185,000.
- All employees may be eligible to become Menlo Security shareholders through eligibility for stock-based compensation grants.
Job Requirements
- Deep architectural understanding of GCP and AWS, with the ability to manage complex IAM policies, standardizing identity, and securing networking layers across both providers.
- Proficiency in Python, Go, or Bash to write custom scripts that eliminate toil, build auto-remediation playbooks, and streamline security operations.
- Experience developing secure Terraform modules and primitives for the organization to stem from, ensuring security defaults are baked into the architecture and catching misconfigurations before deployment.
- Design and maintain shared CI/CD security components (SAST/SBOM/Container Scanning) that are easily adoptable by engineering teams with minimal friction.
- Proven experience securing managed (EKS, GKE) and unmanaged container workloads, with a strong emphasis on automating runtime defenses and admission controllers.
- The ability to operate pragmatically within a lean team, knowing how to prioritize risk based on runtime context and business impact rather than just chasing scanner outputs.
- Proven ability to implement and manage Just-In-Time access policies to replace manual ticket and eliminating standing privileges.
- Due to the role’s involvement in federal compliance activities, the candidate is required to be a US citizen.
- Deploy and manage Cloud Security Posture Management (CSPM) tools to automatically detect and remediate misconfigurations across both providers.
- Implement Cloud Native Application Protection Platform (CNAPP) strategies by shifting left and integrating container image scanning directly into Jenkins and GitLab pipelines.
- Deploy and tune Cloud Workload Protection Platform (CWPP) tools to monitor runtime behavior and detect anomalies in both VMs and Kubernetes pods.
- Build Automated Response Playbooks to automatically enrich alerts, isolate compromised resources, and dismiss low-fidelity noise without human intervention.
- Manage effective permissions across complex multi-cloud IAM structures and standardize secret management workflows.
- Collaborate closely with Technical Program Managers (TPMs) during software releases to enforce compliance standards and oversee vulnerability scanning.
- Respond to customer inquiries regarding the impact of Common Vulnerabilities and Exposures (CVEs) on our product.
Benefits
- Base Salary range for this role is $105,000 - $185,000.
- All employees may be eligible to become Menlo Security shareholders through eligibility for stock-based compensation grants.
Related Guides
Related Categories
Related Job Pages
More Security Engineer Jobs
Cybersecurity Threat and Preparedness Expert
SilverEdge Government SolutionsSilverEdge Government Solutions was founded on the belief that nurturing talent and collaborating closely with our customers enables us to think big and deliver the best for our country. Our mission is to bring top technology talent together to solve the world’s most challenging problems while protecting the United States and our allies. SilverEdge Government Solutions, LLC is an Equal Opportunity Employer and applicants receive lawful consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status.
Cybersecurity Threat Intelligence Expert evaluating incident response strategies
The lead will perform CCRI, vulnerability assessments, and penetration testing across networks, databases, computer applications, and IT frameworks supporting a financial management modernization program.
Staff Product Security Engineer
Greenlight Financial TechnologyGreenlight is the leading family fintech company on a mission to help parents raise financially smart kids. We proudly serve more than 6 million parents and kids with our award-winning banking app for families. With Greenlight, parents can automate allowance, manage chores, set flexible spend controls, and invest for their family’s future. Kids and teens learn to earn, save, spend wisely, and invest. At Greenlight, we believe every child should have the opportunity to become financially healthy and happy. It’s no small task, and that’s why we leap out of bed every morning to come to work. Because creating a better, brighter future for the next generation depends on it.
This role is responsible for the end-to-end security of consumer products, the digital platform, and a new hardware device line, driving security review, threat modeling, and leading penetration testing and PSIRT operations. Key duties include championing secure AI adoption, establishing security guardrails for AI products, and advising on security implications of new features.
Medical Device and IoMT Security Specialist (Level 4) (Remote)
Community Health Systems Professional Services CorporationCommunity Health Systems is one of the nation's leading healthcare providers. With healthcare delivery systems in 36 distinct markets across 14 states, CHS operates 69 affiliated hospitals with more than 10,000 beds and approximately 1,000 other sites of care, including physician practices, urgent care centers, freestanding emergency departments, imaging centers, cancer centers, and ambulatory surgery centers.
This role is responsible for developing, engineering, and maintaining the Medical Device/IoMT Security Program, which includes designing, engineering, managing, and recommending improvements for security solutions and configurations based on NIST standards. The specialist will also identify vulnerabilities, develop remediation processes, provide technical guidance to IT teams, and assist in defining the overall medical device protection strategy.

