About The Position

We’re looking for a Junior–Mid Cybersecurity Engineer who is hands‑on with security operations and excited to improve our defenses across cloud, endpoints, identity, and collaboration tooling. You’ll help run the daily security program, tune and maintain controls, investigate alerts, and contribute to projects that raise our overall security posture. Security Engineering manages our deployed security solutions and controls, implements new security technologies, and evaluates emerging solutions for potential adoption. This role handles all day‑to‑day security operations and partners closely with IT, SRE, and Product Engineering to keep our environments safe and compliant.

Requirements

  • At least 5 years of security engineering background and experience with at least one of the following: SIEM, MDM, Systems hardening, Practical Cloud Security.
  • Experience in tool lifecycle implementation - from Proof of Concept through integration and till decommissioning.
  • Ability to work across time-zones when needed.
  • Solid understanding of computing systems and their operations.
  • Ability to work in a team and flexible deliverables.

Nice To Haves

  • Hands-on experience with cloud platforms (AWS/Google/Azure).
  • Experience with security automation.
  • First hand experience with development of security processes.
  • IT Background.

Responsibilities

  • Own day‑to‑day security operations: triage alerts, investigate events, and drive incidents through containment, eradication, and post‑incident review.
  • Maintain detection rules, playbooks, and runbooks; continually reduce false positives and MTTR.
  • Troubleshoot users on issues with security tooling.
  • Review and harden AWS security services (e.g., IAM/SCPs, GuardDuty, Security Hub, CloudTrail/Config, KMS, WAF).
  • Operate MDM for device compliance, disk encryption, patching, and baseline configurations.
  • Operate AV/EDR and firewall policies; support enterprise browser security policies and extensions.
  • Harden Cloud services and partners (DLP, context‑aware access, OAuth app controls, group/SSO hygiene, 2SV/passkeys).
  • Conduct POCs and evaluation on security tools for adoption.
  • Support IT operations when needed.
  • Implement new security technologies and integrations; document deployments and handoffs.
  • Create security automations for tooling.
  • Support asset/inventory accuracy, least‑privilege access reviews, and change control.
  • Assist with security reviews, vendor risk, and audit evidence for SOC 2/ISO 27001‑style controls.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service