Security Engineer
Title: Security Engineer
Reporting to: Chief Information Security Officer
Location/Travel: This position can be based remotely in the US, or based in our Bethesda, MD HQ
Opportunity:
As a cloud first organization we’re looking for a hands-on Security Engineer with deep Linux in AWS expertise highlighted with strong DevOps/DevSecOps experience. You’ll harden our Linux estates, embed security into our build/deploy pipelines, and partner with engineering to ship secure software at speed.
What Success Looks Like (First 6-12 Months)
- Baseline Linux hardening and patch automation rolled out with ≥95% fleet compliance.
- CI/CD pipelines enforce SAST/SCA/IaC policy gates with <2% secrets leaks.
- Fargate/ECS/ECR admission policies block noncompliant images; image signing is enforced for production.
- Actionable detections added to SIEM; MTTD/MTTR measurably reduced quarter-over-quarter.
- Leverage AI to analyze complex datasets, identify patterns, and categorize insights. Develop and deploy custom utilities and automation tools to accelerate data-driven decision-making and enhance operational efficiency across the organization.
- Fine tune alerts, including utilizing automation and AI.
Tech You’ll Use
Linux (Debian/Ubuntu/RHEL/Alpine), Docker, Terraform, Terragrun, Ansible, GitLab, AWS (IAM), snyk/Dependabot/Depency Track, Semgrep, OWASP ZAP/Burp Suite Pro/Enterprise.
How We Work
- Automation first: we encode controls in code and enforce via pipelines and platforms.
- Secure defaults: opinionated templates and guardrails beat manual checklists.
- Measure & improve: we track risk reduction, time-to-patch, and detection efficacy as some of our metrics.
Responsibilities:
- Linux security across servers, containers, and endpoints: hardening (CIS/NIST baselines), patching, kernel/module controls, eBPF/AppArmor/SELinux, SSH and PAM policies, and key management.
- Build security into CI/CD: design guardrails and automate checks (SAST/DAST/SCA, secrets scanning, IaC policy-as-code) in tools like GitLab.
- Cloud & container security: implement least-privilege IAM; secure VPC/VNet design; KMS usage; Secrets manager hardening; image signing, admission controllers, runtime controls, and registry policies.
- IaC & platform: create secure-by-default Terraform/Terragrunt modules; codify baseline controls; maintain reusable templates and golden AMIs/images.
- Threat modeling & reviews: conduct design reviews, STRIDE-style threat models, and pre-prod security sign-offs for new services.
- Vuln management: run scans (hosts/containers/dependencies), triage findings, drive remediation SLAs, and report risk posture, with tools from Rapid7 and or Wazuh.
- Detection & response: tune EDR/agent configs, ship logs, build detections in SIEM, participate in on-call/IR, and run post-incident learnings.
- Secrets & identity: manage/monitor KMS, rotate credentials, and implement workload identity/federation for humans and services.
- Compliance enablement: map controls to SOC 2/HITRUST/FedRAMP Moderate/NIST; produce evidence via automation; partnering with GRC for audits.
- Advocacy & enablement: create docs/runbooks, lead brown-bags, and coach teams on secure coding and platform usage.
Requirements:
- 4-7+ years in security engineering, platform security, or SRE with a security focus.
- Expert-level Linux administration and hardening (kernel, access controls, networking, filesystems, systemd).
- Understanding of and exposure to current AI/LLM models and use cases.
- Strong DevOps/DevSecOps background: CI/CD design, artifact management, environment promotion, and policy-as-code.
- Proficiency in Python and/or Bash and in automating security tasks at scale.
- Hands-on with cloud IAM, networking, and encryption fundamentals (VPCs, security groups, TLS/mTLS, KMS, PKI).
- Experience operating containers securely (RBAC, PSP replacement, network policies, secrets, admission controls).
- Demonstrated work with vulnerability management, dependency scanning, and remediation workflows.
- Familiarity with SIEM/EDR, log pipelines, and incident response practices.
- Solid understanding of network security (routing, firewalls, DNS, TLS, SSH, VPNs, proxies).
- Excellent collaboration and communication with developers, SRE, and GRC.
- Adhere to all organizational information security policies and protect all sensitive information including but not limited to ePHI and PHI in accordance with organizational policy and Federal, State, and local regulations.
Even Better:
- Experience with supply-chain security (Sigstore, SBOMs, provenance/attestations).
- Exposure to secret zeroization and key lifecycle management.
- Prior work mapping/implementing SOC 2, HITRUST, FedRAMP Moderate, ISO 27001, NIST 800-53/1900 controls.
- Certifications (nice but not required): OSCP/OSWP, CISSP, GSEC, GCIA, GCSA, CKA/CKS.
About Get Well:
Now part of the SAI Group family, Get Well is redefining digital patient engagement by putting patients in control of their personalized healthcare journeys, both inside and outside the hospital. Get Well is combining high-tech AI navigation with high-touch care experiences driving patient activation, loyalty, and outcomes while reducing the cost of care. For almost 25 years, Get Well has served more than 10 million patients per year across over 1,000 hospitals and clinical partner sites, working to use longitudinal data analytics to better serve patients and clinicians. AI innovator SAI Group led by Chairman Romesh Wadhwani is the lead growth investor in Get Well. Get Well’s award-winning solutions were recognized again in 2024 by KLAS Research and AVIA Marketplace. Learn more at Get Well and follow-us on LinkedIn and Twitter.
When it comes to careers, our approach is simple: empower employees to do their best work and live their best professional and personal lives. Meeting the needs of a diverse group of employees across more than 30 states means offering tools to support financial, physical and emotional well-being and the choice to design what meets your needs. You’ll find everything you’d expect and many things you don’t: exceptionally generous paid time away from work, a variety of paid leave programs, savings opportunities with 401(k) and incentive plans, internal education programs, full array of health benefits, fitness reimbursement, cell phone subsidy, casual offices with snacks and drinks, peer recognition programs, health advocacy and employee assistance programs, chili cook-offs, pet insurance (yes, really) and so much more. Our most valuable benefit? An environment that supports YOU. The estimated pay range for this position is $110,000 - $130,000 in base salary plus bonus. Base salary is dependent on many factors including, but not limited to education, experience and skills. This range is subject to change and may be modified in the future.
Get Well is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age or veteran status.