May 19, 2026
SecurityFull-timeHybridSecurity Engineer
Why Join Us?
We are building at the intersection of institutional finance and emerging technology. Backed by $40M in funding from leading investors, we are bringing together the best minds from Ethereum and Wall Street to rebuild the infrastructure underpinning the financial system — faster, safer, and fully on-chain.
Security is not a cost center here. It is a client-facing differentiator and a core part of how we earn trust with the institutional counterparties we serve. The security program you help build will be referenced in client due diligence packages, auditor engagements, and enterprise contract negotiations.
You will report directly to the CISO, operate with technical autonomy, and have the organisational support to execute a genuinely production-grade security program.
What Will You Do?
We are building our security program from the ground up — and doing it right. While still at the startup stage, we are moving rapidly toward enterprise-grade security controls, processes, and procedures. We are hiring a Security Engineer who will serve as the hands-on execution layer of a security strategy designed by the CISO and backed by meaningful organisational investment.
This is not a compliance checkbox role. This is a builder role.
You will execute the technical implementation of a modern, cloud-native security stack — standing up identity enforcement, endpoint protection, cloud posture management, threat detection, and GRC evidence pipelines that are production-grade and auditor-credible. You will work directly with the CISO to accelerate the security timeline, strengthen controls, and build automation infrastructure that compounds in value across every future review cycle.
The work you do here becomes the foundation the organisation scales on for years to come.
Strategic Alignment
This role is a direct investment in revenue acceleration and operational scalability. You will succeed by delivering:
- Accelerated Security Improvement: Hands-on, parallel technical execution in partnership with the CISO across security engineering and GRC
- Improved Audit Quality: Well-optimised technical integrations that produce clean, timestamped, auditor-legible evidence chains across every control
- Automation Compounding: Secure, automated processes for threat prevention, detection, and response that scale with company growth
Technical Requirements
Security Infrastructure & Implementation
- Design, deploy, and maintain core security controls across identity, endpoint, cloud, and application layers — including SSO/MFA enforcement, MDM, EDR, CSPM, secrets management, and DLP
- Own the technical integration of security tooling across the organisation's environment, ensuring controls are properly configured, enforced, and producing auditor-credible evidence
- Drive parallel workstreams across infrastructure, GRC, and daily operations under the direct guidance of the CISO
Monitoring, Detection & Incident Response
- Build and maintain detection coverage across all cloud and endpoint systems; validate alert paths through formal, documented test scenarios
- Monitor security alerts and logs for anomalous activity; investigate potential incidents and deliver timely, structured updates to the CISO
Vulnerability & Patch Management
- Lead the vulnerability management lifecycle: scanning, triage, SLA-tracked remediation, and patching verification across cloud workloads, endpoints, and system dependencies
- Maintain a complete inventory of non-human identities (service accounts, API keys, bot tokens, Lambda roles) including ownership, rotation schedules, and expiry tracking
Automation & Continuous Improvement
- Identify and implement automation across security controls, alerting, evidence collection, and operational workflows to reduce manual burden and improve program scalability
- Proactively identify gaps in security posture and regularly bring forward recommendations to the CISO
GRC & Compliance Support
- Maintain alignment between technical controls and governance and compliance requirements in collaboration with the CISO
- Collect, maintain, and organise audit evidence and artifacts to support efficient, clean audit engagements
- Collaborate with the CISO on gap analysis against SOC 2 and other evolving requirements
Employee Lifecycle & Operational Support
- Assist with security onboarding for new employees — including device enrollment, identity provisioning, and access grants — as well as offboarding, including documented access revocation and device decommission
- Develop and maintain documentation of security configurations, standard operating procedures, and remediation efforts
- Provide technical security support to staff as needed
Qualifications
Required
- Based in Austin, Texas or willing to relocate (hybrid role)
- 3+ years of hands-on security engineering experience in a cloud-native environment
- Demonstrated experience implementing and administering identity and access management platforms
- Hands-on experience with AWS security services (IAM, CloudTrail, GuardDuty, Security Hub, Secrets Manager)
- Working knowledge of cloud security posture management tools (Wiz, Prisma Cloud, Prowler, or equivalent)
- Working knowledge of integrating SAST/SCA tooling into CI/CD pipelines and managing vulnerability remediations
- Ability to produce audit-quality security documentation and evidence artifacts
- Understanding of where AI fits into the security stack today and where traditional processes remain essential
- Eagerness to adopt and implement increasingly AI-driven processes
- Comfortable operating in a high-autonomy, high-accountability environment with direct executive leadership visibility
Preferred
- Experience supporting a SOC 2 audit end-to-end
- Familiarity with GRC platforms (Vanta, Drata, SecureFrame, or equivalent) including control mapping and evidence collection
- Scripting experience for security automation
- Exposure to DLP tooling and/or AI data governance
- Familiarity with NIST CSF, NYDFS Part 500, or equivalent regulatory frameworks
- Experience in a startup or high-growth environment where the security program was built, not inherited
Certifications (Preferred, Not Required)
- AWS Solutions Architect – Associate
- AWS Certified Security – Specialty
- Certified Information Systems Security Professional (CISSP)