Salary
💰 $170,000 - $220,000 per year
Tech Stack
AWSCloudCyber SecurityGrafanaKubernetesPrometheusSplunk
About the role
- Sift is a platform providing real-time observability over high-frequency telemetry for mission-critical systems
- Define and own Sift's end-to-end security posture, architecture, and practices as the founding Security Engineer
- Build secure CI/CD pipelines with embedded scanning
- Operate and tune SIEM/EDR and observability tooling across cloud and on-prem
- Secure multi-cloud environments (AWS GovCloud), Kubernetes, and on-prem infrastructure
- Implement zero-trust networking and modern SASE/ZTNA approaches
- Improve visibility and observability across networks and workloads
- Partner with external compliance firms to align with SOC 2, ISO 27001, NIST 800-171, FedRAMP, and CMMC
- Support third-party/vendor security assessments and readiness for audits and government reviews
- Provide company-wide security awareness training focused on secure development and operations practices
Requirements
- 5+ years in cybersecurity, product security, or cloud security roles, ideally in high assurance or regulated industries
- Hands-on experience securing AWS or equivalent cloud (GovCloud preferred) and Kubernetes-based environments
- Strong infrastructure as code practices
- Familiarity with compliance frameworks (SOC 2, ISO 27001, NIST 800-171, FedRAMP, CMMC)
- Deep understanding of network, endpoint, and identity security principles
- Experience with security tooling and integration into operational workflows (SIEM/EDR, ELK, Datadog, Splunk, CrowdStrike, Prometheus, Grafana)
- Ability to translate security and regulatory requirements into actionable engineering work
- Experience handling customer-facing security reviews and technical inquiries
- Clear communicator with technical and non-technical stakeholders
- Customer-facing presence for audits and enterprise assurance
- Collaborative partner to infra and product teams
- High ownership and adaptability in ambiguous, fast-moving environments
- Integrity and discretion handling sensitive data
- Comfortable operating as the lone security hire and building a security function over time