Chainway Labs

SecOps Engineer

Chainway Labs

full-time

Posted on:

Location Type: Remote

Location: Turkey

Visit company website

Explore more

AI Apply
Apply

Job Level

About the role

  • Help run day-to-day operational security: monitoring, tooling administration, user support, internal controls, and hands-on incident response support.
  • Participate in the incident rotation (on-call / responder schedule as defined by the team).
  • Triage and escalate security alerts (SIEM/EDR/cloud/app signals).
  • Assist with incident handling: evidence collection, timeline building, containment steps, comms notes, and post-incident action tracking.
  • Maintain and improve incident runbooks, checklists, and escalation paths.
  • Administer and support security tools such as: SIEM / log pipelines (basic rule tuning, alert routing, dashboards, integrations).
  • EDR policy checks and operational maintenance (triage, device status follow-ups).
  • Improve signal quality: reduce noise, identify monitoring gaps, ensure coverage for critical systems.
  • Participate in internal control routines (periodic checks, evidence collection, documentation updates).
  • Help with access control audits (reviews, recertification cycles, exception tracking).
  • Help operate the bug bounty program: initial triage, reproduction, severity suggestions, routing to engineering, tracking fixes to closure.
  • Write and maintain simple scripts (Python and/or Bash preferred) to automate repetitive security ops tasks (enrichment, reporting, inventory sync, alert deduping, API pulls).

Requirements

  • English proficiency (you will write incident notes, procedures, and communicate in English daily).
  • Ability to write simple scripts (Python and/or Bash) and work with APIs/JSON.
  • 1–3+ years in Security Operations / IT Ops / SysAdmin / SOC / DevOps with security responsibilities.
  • Practical understanding of common security concepts: IAM basics, phishing/social engineering patterns, endpoint hygiene, logging/monitoring, incident triage.
  • Comfortable with Linux/macOS/Windows basics and common SaaS admin consoles.
  • Nice to have: Experience with at least one SIEM (Splunk, Elastic, Sentinel, Datadog, etc.) and alert tuning.
  • Familiarity with cloud security fundamentals (AWS/GCP/Azure), Kubernetes, or CI/CD logs.
  • Exposure to vulnerability management and bug bounty workflows (HackerOne/Intigriti/etc.).
  • Experience supporting security awareness/training programs or compliance evidence collection (SOC 2 / ISO 27001 style routines).
  • Security certifications are a plus
Benefits
  • Competitive compensation package, including equity options
  • Remote work setting
  • Engaging community activities that foster team bonding and collaboration.
  • A welcoming atmosphere where every team member's opinion is valued.
  • A dynamic team environment filled with bright, young, and dedicated colleagues, offering an enriching collaborative experience.

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
PythonBashSIEMEDRAPIJSONLinuxmacOSWindowsKubernetes
Soft skills
English proficiencyincident responsecommunicationdocumentationproblem-solvingattention to detailteam collaborationincident handlinguser supporttriage
Certifications
SOC 2ISO 27001