
SecOps Engineer
Chainway Labs
full-time
Posted on:
Location Type: Remote
Location: Turkey
Visit company websiteExplore more
Job Level
About the role
- Help run day-to-day operational security: monitoring, tooling administration, user support, internal controls, and hands-on incident response support.
- Participate in the incident rotation (on-call / responder schedule as defined by the team).
- Triage and escalate security alerts (SIEM/EDR/cloud/app signals).
- Assist with incident handling: evidence collection, timeline building, containment steps, comms notes, and post-incident action tracking.
- Maintain and improve incident runbooks, checklists, and escalation paths.
- Administer and support security tools such as: SIEM / log pipelines (basic rule tuning, alert routing, dashboards, integrations).
- EDR policy checks and operational maintenance (triage, device status follow-ups).
- Improve signal quality: reduce noise, identify monitoring gaps, ensure coverage for critical systems.
- Participate in internal control routines (periodic checks, evidence collection, documentation updates).
- Help with access control audits (reviews, recertification cycles, exception tracking).
- Help operate the bug bounty program: initial triage, reproduction, severity suggestions, routing to engineering, tracking fixes to closure.
- Write and maintain simple scripts (Python and/or Bash preferred) to automate repetitive security ops tasks (enrichment, reporting, inventory sync, alert deduping, API pulls).
Requirements
- English proficiency (you will write incident notes, procedures, and communicate in English daily).
- Ability to write simple scripts (Python and/or Bash) and work with APIs/JSON.
- 1–3+ years in Security Operations / IT Ops / SysAdmin / SOC / DevOps with security responsibilities.
- Practical understanding of common security concepts: IAM basics, phishing/social engineering patterns, endpoint hygiene, logging/monitoring, incident triage.
- Comfortable with Linux/macOS/Windows basics and common SaaS admin consoles.
- Nice to have: Experience with at least one SIEM (Splunk, Elastic, Sentinel, Datadog, etc.) and alert tuning.
- Familiarity with cloud security fundamentals (AWS/GCP/Azure), Kubernetes, or CI/CD logs.
- Exposure to vulnerability management and bug bounty workflows (HackerOne/Intigriti/etc.).
- Experience supporting security awareness/training programs or compliance evidence collection (SOC 2 / ISO 27001 style routines).
- Security certifications are a plus
Benefits
- Competitive compensation package, including equity options
- Remote work setting
- Engaging community activities that foster team bonding and collaboration.
- A welcoming atmosphere where every team member's opinion is valued.
- A dynamic team environment filled with bright, young, and dedicated colleagues, offering an enriching collaborative experience.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
PythonBashSIEMEDRAPIJSONLinuxmacOSWindowsKubernetes
Soft skills
English proficiencyincident responsecommunicationdocumentationproblem-solvingattention to detailteam collaborationincident handlinguser supporttriage
Certifications
SOC 2ISO 27001