Jito Labs

Security Engineer

Jito Labs

full-time

Posted on:

Location Type: Remote

Location: United States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $175,000 - $195,000 per year

About the role

  • Identity and access management - provisioning, lifecycle operations, and monitoring for critical changes
  • Security reviews across our product portfolio - threat modeling, code review, fuzzing, and functional testing
  • Day-to-day bug bounty operations - triage, remediation tracking, and escalation of high-severity findings
  • AI security research and tooling - adversarial testing frameworks for agent controls, with a focus on reusable patterns
  • Software supply chain monitoring - malicious package detection beyond standard CVE scanning
  • External penetration test coordination - scoping, logistics, and post-engagement remediation tracking
  • Compliance documentation and evidence gathering as requirements emerge

Requirements

  • A software engineering background is essential - you've built production systems and that foundation shapes how you approach security
  • You've since moved into product security and are fluent in the full lifecycle: threat modeling, secure design review, whitebox code review, and vulnerability testing
  • Solid understanding of identity and access management concepts and tooling
  • Genuine interest in AI security with the ability to build adversarial testing tooling
  • A thoughtful approach to software supply chain risk beyond checkbox scanning
  • Strong written communication - documentation is a real part of this job
  • Comfortable with high ownership and working autonomously on a small team
Benefits
  • Salary based on experience
  • Above-market total compensation and multiple forms of equity
  • 100% employer-paid health benefits
  • All-expenses-paid team retreats and conferences
  • Weekly meal voucher
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
identity and access managementthreat modelingcode reviewfuzzingfunctional testingbug bounty operationsadversarial testingvulnerability testingsoftware supply chain monitoringmalicious package detection
Soft Skills
strong written communicationhigh ownershipautonomous workthoughtful approach