Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law.
Senior Security Engineer
Location
United States
Posted
20 hours ago
Salary
$170K - $200K / year
No structured requirement data.
Job Description
About the Role
Abnormal AI is seeking a Senior Security Engineer to ensure Abnormal’s FedRAMP environment operates securely, resiliently, and efficiently. This role focuses on security operations engineering, with responsibilities spanning CI/CD pipelines, access management, patch management, change reviews, incident response, and security automation. The engineer will directly own and improve the technical workflows that keep Abnormal Gov systems compliant and resilient at scale. The ideal candidate combines deep cloud and infrastructure security expertise with operational discipline, and is AI-enabled to maximize efficiency and reduce overhead.
What you will do
- Maintain and improve CI/CD pipelines to support secure deployments and infrastructure workflows.
- Manage infrastructure-as-code (IaC) PR and Change Control Board reviews, ensuring changes are tested, approved, and secure before release.
- Perform security impact analyses (SIAs) for system/application changes and provide recommendations.
- Run OS and infrastructure patch cycles; manage hardened images and patch workflows for FedRAMP environments.
- Govern access management, including account provisioning, RBAC module maintenance, and periodic reviews.
- Manage logging and monitoring pipelines; tune SIEM ingestion and alerting for coverage and accuracy.
- Triage and respond to security incidents, from alert investigation through containment, recovery, and after-action reporting.
- Maintain and refine runbooks, SOPs, and documentation to ensure consistent operations and audit readiness.
- Collaborate with DevInfra, FedOps, Product, and Compliance teams to embed secure practices into operations and development.
Must Haves
- 5+ years in security engineering or infrastructure operations within federal or regulated cloud environments.
- Strong familiarity with NIST 800-53 controls and continuous monitoring practices.
- Proven delivery of AWS/SaaS security best practices.
- Hands-on expertise with CI/CD, infrastructure automation, and IaC security practices.
- Experience in patch management, hardened baselines, and secure image pipelines.
- Strong knowledge of identity and access management (IAM) design and enforcement in large-scale environments.
- Proven ability to manage SIEM pipelines and lead Tier 1/ Tier 2 incident response.
- Strong technical documentation, collaboration, and incident/project management skills.
Nice to Have
- Experience integrating security automation into CI/CD pipelines and SecOps workflows.
- Prior experience supporting federal audits or 3PAO engagements.
- Knowledge of SaaS security operations and monitoring at scale.
- Experience driving automation in security operations, compliance tracking, and evidence management.
- Knowledge of SaaS security operations and modern cloud environments; exposure to DevSecOps pipelines or security reviews for Terraform/containers.
#LI-AW1
At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons.
Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please click here. If you would like more information on your EEO rights under the law, please click here.
Related Guides
Related Categories
Related Job Pages
More Security Engineer Jobs
The engineer will be hands-on building core endpoint privilege capabilities, focusing on agent behavior, policy enforcement, elevation workflows, auditing, and integrations for enterprise and MSP environments. Responsibilities include designing, building, and maintaining these capabilities while hardening agent components and implementing platform integrations.
The role involves owning features across the full stack, from initial detection requirements through production, spanning browser extension code, backend services for event ingestion and alerting, and data pipelines. Responsibilities include writing content scripts to interact with web pages, building backend services, and collaborating with security researchers to implement threat intelligence into working detections.
The Red Team Researcher will be responsible for identifying and exploiting vulnerabilities across Ford's applications, cloud implementations, APIs, infrastructure, and in-vehicle systems to enhance the overall security posture. This involves collaborating through all phases of an engagement, from initial identification and access to establishing persistence and consulting on remediation.
The Adjunct Lecturer of Epidemiology provides high-quality online teaching and instruction to graduate students in the Master of Public Health (MPH) program. The faculty member serves as a subject matter expert in epidemiology and contributes to the delivery of an engaging, outco...