About The Position

You're a detail-oriented security engineer who understands that strong security comes from disciplined configuration management and consistent enforcement. You're comfortable deploying and managing enterprise security tools, and you know how to translate regulatory requirements into practical technical controls. You think in terms of baselines and drift. You understand that endpoint hardening, SaaS configuration security, identity controls, browser management, MDM, and Zero Trust are interconnected components of enterprise defense. You're structured in your documentation, disciplined in change management, and motivated by reducing systemic risk through automation. You work well across teams—partnering with IT, Security Operations, GRC, and application owners to ensure systems are deployed securely and remain compliant over time.

Requirements

  • 4–8+ years of experience in security engineering, systems engineering, or enterprise IT security
  • Hands-on experience with enterprise security tooling (e.g., Zscaler, MDM platforms, browser enterprise management, EDR, SIEM)
  • Experience implementing and maintaining configuration baselines aligned to NIST 800-53, CMMC 2.0, DISA STIGs, or similar frameworks
  • Familiarity with SaaS security configuration and identity/access management controls
  • Experience with raw API-based integrations and no-code automation platforms (Tines, Okta Workflows)
  • Demonstrated experience automating configuration enforcement and reducing manual security tasks
  • Strong understanding of change management and documentation practices
  • Ability to translate compliance requirements into technical control implementations
  • Strong communication skills and ability to work across technical and non-technical teams

Nice To Haves

  • Experience in regulated or DoD-adjacent environments

Responsibilities

  • Implement and maintain enterprise security tooling and approved configuration baselines across endpoints, browsers, SaaS platforms, and identity systems, aligned with CMMC 2.0, NIST 800-53, and internal standards.
  • Partner with Corporate Security Engineering leadership and Vulnerability Management to ensure configuration controls and remediation efforts are aligned, measurable, and enforceable.
  • Continuously improve security configurations by reducing drift, expanding automation, and strengthening documentation and evidence collection to support audit readiness.
  • Collaborate with Corporate IT, Security Operations, and application owners to securely deploy systems and SaaS platforms, providing guidance during rollouts and participating in security reviews.
  • Maintain structured processes for baseline updates, configuration reviews, drift detection, and control validation, ensuring changes are documented, approved, and traceable to compliance requirements.
  • Implement and enforce technical controls that protect the confidentiality, integrity, and availability of corporate systems while meeting regulatory and privacy commitments.
  • Ensure configuration data, drift findings, and remediation evidence are accurate, access-controlled, and retained in accordance with policy.
  • Support compliance assessments by providing defensible artifacts and escalate identified control gaps or systemic risks to Security Engineering leadership.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service