We are looking for a Cloud Security Engineer at Materialize with a specific focus on our Cloud SaaS product.
The role will require you to build the systems, tools and processes to ensure that our customers data is protected at all times. You'll also be responsible for general security and compliance of all production systems in the cloud. Additionally, you will be part of the Cloud Engineering team but will work closely with Product, Engineering and Sales team in a cross-functional role to respectively design, build and educate our customers and prospects as to the highest security standards.
Materialize is deployed on top of streaming message queues, like Kafka, and allows users to specify arbitrary SQL views on top of their queues and query those views instantly. Stream processing software like Kafka has greatly improved the end-to-end latency of moving messages around in real time, but today there's no good solution for making use of that data easily. Materialize brings the user-facing simplicity of SQL views - for arbitrary SQL queries, not just some SQL-inspired minimal language - to the streaming data ecosystem
- As part of the engineering team, contribute to our cloud infrastructure by writing infrastructure-as-code
- Recommend and setup threat detection and monitoring services for our cloud environment
- Automate vulnerability discovery in our cloud environment
- Support product development by recommending and implementing security features, and then contributing directly to the codebase to implement those features
- Speak to customers to identify security requirements that map to product features
- Setup IAM and access management in AWS and other tools
- Communicate technical concepts and issues to the non-technical
- Assist in building out the security team; interviewing
- Represent overall product security in discussions with prospective and current customers
- Prior experience as a security engineer or comparable title
- Experience in securing production cloud infrastructure and applications (managing secrets, securing CI/CD pipeline, authorization/authentication protocols, Web Application Firewalls, etc)
- Experience in using centralized logging and monitoring systems for investigation and audits (CloudWatch, Honeycomb, Grafana, NewRelic, etc)
- Experience writing Infrastructure-as-Code. We use Pulumi, but Pulumi experience isn’t required; Terraform, CloudFormation, or anything else is fine (as long as you’re willing to learn Pulumi once you start)
- Experience with AWS and AWS services
- Familiar with compliance standards (SOC 2, NIST, PCI DSS, etc)
- Familiar with privacy standards (GDPR, CCPA, HIPPA, etc.)
- Experience programming in Rust and understanding of what vulnerabilities are (and are not) addressed by Rust.
- Experience in small to mid startups