Staff Information Security Engineer
Remote
Applications have closed
ReCharge Payments
Who we are
In a world where acquisition costs are skyrocketing, funding is scarce, and ecommerce merchants are forced to do more with less, the most innovative DTC brands understand that subscription strategy is business strategy.
Recharge is simplifying retention and growth for innovative ecommerce brands. As the #1 subscription platform, Recharge is dedicated to empowering brands to easily set up and manage subscriptions, create dynamic experiences at every customer touchpoint, and continuously evaluate business performance. Powering everything from no-code customer portals, personalized offers, and customizable bundles, Recharge helps merchants seamlessly manage, grow, and delight their subscribers while reducing operating costs and churn. Today, Recharge powers more than 20,000 merchants serving 90 million subscribers, including brands such as Blueland, Hello Bello, CrunchLabs, Verve Coffee Roasters, and Bobbie—Recharge doesn’t just help you sell products, we help build buyer routines that last.
Recharge is recognized on the Technology Fast 500, awarded by Deloitte, (3rd consecutive year) and is Great Place to Work Certified.
Overview
As a Staff Information Security Engineer, you will play a pivotal role in designing, implementing, and maintaining robust security measures to safeguard our cloud network infrastructure. You will be responsible for ensuring the confidentiality, integrity, and availability of our critical systems, as well as proactively identifying and mitigating potential security threats.
In this role, you will be a core contributor in ensuring the security of Recharge’s cloud platform. You will collaborate, both within and outside of your team to clarify, theorize, figure out, and decide solutions to complex problems.
What you’ll do
Network Security Architecture:
Design, implement, and maintain secure network architectures, ensuring the confidentiality, integrity, and availability of data.
Create and maintain network and security documentation.
Collaborate with cross-functional teams to integrate security measures into network designs and implementations.
Firewall and Intrusion Prevention:
Configure and manage firewalls (including WAFs), intrusion prevention systems, SIEM, and other network security devices and/or tools.
Monitor network traffic for unusual activity and respond to security incidents in a timely manner.
Vulnerability Assessment:
Conduct regular vulnerability assessments on network infrastructure to identify and remediate potential security risks.
Stay abreast of emerging threats and vulnerabilities, applying proactive measures to protect against them.
Maintain and continuously improve incident response plans, participate in tabletop exercises, and lead incident response efforts when necessary.
Collaborate with internal teams and external stakeholders to investigate and mitigate security incidents.
Mentor other engineers on security configurations and best practices
Investigate, analyze and evangelize good security posture throughout the organization
Live by and champion our values: Accountability, Collaboration, Iteration and Details
What you’ll bring
Network security design experience and an an in-depth knowledge of network protocols, firewall configurations, and intrusion detection/prevention systems
Extensive knowledge of Vulnerability Management practices
Understanding of virus and malware defense systems
Understanding of backup systems and disaster recovery planning
Experience with security assessment tools and techniques
Ability to manage multiple projects, activities, and tasks simultaneously
Ability to learn and support new systems and applications
Strong analytical and problem-solving skills
Excellent communication and collaboration skills
Willingness to participate in a first line of support on-call rotation
Desire to work remotely and to make an impact
Experience/Credentials/Education
10+ years of experience in network and/or security roles, with a focus on edge security tools
2+ years experience with k8s, Helm, IaC, Terraform and Docker
2+ years experience with Monitoring, Metrics and Logging (Splunk) solutions.
5+ years experience in cloud-native environments such as GCP, AWS, or Azure
Bachelor’s degree in Computer Science, Information Technology, or related field
Relevant certifications such as CISSP, CCSP, GSEC, or equivalent
Our stack
GCP, Kubernetes, GitLab, Helmfile, Terraform, Docker, Ansible, Nginx, Redis, CloudSQL/MySQL, Python, Flask, React, Vue.js, Snowflake, Looker
Recharge | Instagram | Twitter | Facebook
Recharge Payments is an equal opportunity employer. In addition to EEO being the law, it is a policy that is fully consistent with our principles. All qualified applicants will receive consideration for employment without regard to status as a protected veteran or a qualified individual with a disability, or other protected status such as race, religion, color, national origin, sex, sexual orientation, gender identity, genetic information, pregnancy or age. Recharge Payments prohibits any form of workplace harassment.
Transparency in Coverage
This link leads to the Anthem Blue Cross machine-readable files that are made available in response to the federal Transparency in Coverage Rule and includes network negotiated rates for all items and services; allowed amounts for OON items, services and prescription drugs; and negotiated rates and historical prices for network prescription drugs (delayed). EIN 80-6245138. This link leads to the Kaiser machine-readable files.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Ansible AWS Azure CCSP CISSP Cloud Computer Science Docker E-commerce Ecommerce Firewalls Flask GCP GitLab GSEC Helm Incident response Intrusion detection Intrusion prevention Kubernetes Malware Monitoring MySQL Network security Nginx Python Redis Security assessment SIEM Snowflake Splunk Strategy Terraform Vulnerabilities Vulnerability management
Perks/benefits: Career development Transparency
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Security Specialist jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs