Security Operations Engineer

  1. Home
  2. Remote jobs
  3. Architecture
  • Company Abacus Insights
  • Employment Full-time
  • Location 🇺🇸 United States nationwide
  • Submitted Posted 2 days ago - Updated 7 hours ago
<div class="content-intro"><p><span style="font-size: 12pt;"><strong><span style="font-family: helvetica, arial, sans-serif;">About Us</span></strong></span></p><p><span style="font-size: 12pt;">Abacus Insights is transforming how data works for health plans. Our mission is simple: make healthcare data usable, so the people responsible for care and cost decisions can act faster, with confidence. &nbsp;</span><br><span style="font-size: 12pt;">We help health plans break down data silos to create a single, trusted data foundation. That foundation powers better decisions —so plans can improve outcomes, reduce waste, and deliver better experiences for members and providers alike. &nbsp;</span></p><p><span style="font-size: 12pt;">Backed by $100M from top investors, we’re tackling big challenges in an industry that’s ready for change. &nbsp;Our platform enables GenAI use cases by delivering clean, connected, and reliable healthcare data that can support automation, prioritization, and decision workflows—and it’s why we are leading the way. </span></p><p><span style="font-size: 12pt;">Our innovation begins with people. We are bold, curious, and collaborative—because the best ideas come from working together. Ready to make an impact? Join us and let's build the future together.</span></p></div><p><span style="font-size: 12pt;"><strong>About the Role</strong></span></p><p><span style="font-size: 12pt;">We are seeking a&nbsp;<strong>Security Operations Engineer</strong> to own and operate the day‑to‑day security operations that enable our platform, our AI initiatives, and our teams to move quickly and safely. This role sits at the center of how security functions in a fast‑moving, cloud‑first environment — ensuring security signals are acted on, risks are addressed, and compliance obligations are met without slowing the business down.</span></p><p><span style="font-size: 12pt;">As our organization scales and our use of AI and connected systems accelerates, security operations must be highly responsive, deeply integrated with engineering, and able to operate with clarity under ambiguity. This role exists to unlock that scale. You will be responsible for turning alerts, findings, and requests into resolved outcomes — reducing operational drag on senior engineers and ensuring security work moves predictably from intake to closure.</span></p><p><span style="font-size: 12pt;">This is a flow‑ownership role, not a platform architecture role. Success is defined by execution: issues don’t stall, evidence exists when needed, audits are smooth, and teams trust the security process. You will act as the connective tissue between security tooling, engineering teams, compliance requirements, and documented results — bringing structure, discipline, and follow‑through to complex operational work.</span></p><p><span style="font-size: 12pt;">Working closely with Security Engineering, Cloud Engineering, IT, and Compliance, you will play a critical role in keeping security scalable, auditable, and aligned with business priorities — allowing the broader organization to focus on innovation while you ensure the foundation remains strong.</span></p><p><span style="font-size: 12pt;"><strong>Your day to day</strong></span></p><p><span style="font-size: 12pt;"><strong>Security Operations &amp; Triage</strong></span></p><ul><li style="font-size: 12pt;"><span style="font-size: 12pt;">Own the end-to-end‑ lifecycle of security operational work from intake to closure, including triage, prioritization, routing, and verification.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Serve as the primary owner of the security operations backlog in Jira, ensuring issues are clearly scoped, properly assigned, and progressing.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Triage and manage findings from security tooling (e.g., CSPM, SIEM, DLP, endpoint security), escalating when necessary and closing the loop with evidence.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Act as the first line of operational response for routine security requests such as firewall rules, IP allowlisting, certificate management, logging changes, and access related‑ exceptions.</span></li></ul><p><span style="font-size: 12pt;"><strong>Vulnerability &amp; Findings Management</strong></span></p><ul><li style="font-size: 12pt;"><span style="font-size: 12pt;">Manage cloud and application security findings through remediation, exception, or risk acceptance workflows.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Coordinate directly with engineering teams on remediation efforts, ensuring expectations, deadlines, and verification steps are clear.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Maintain accurate status tracking and supporting evidence for remediation and audit purposes.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Support recurring vulnerability management activities and reporting requirements.</span></li></ul><p><span style="font-size: 12pt;"><strong>&nbsp;</strong><strong>Monitoring, Logging &amp; Detection Hygiene</strong></span></p><ul><li style="font-size: 12pt;"><span style="font-size: 12pt;">Execute daily, weekly, and monthly security review tasks, including log reviews, alert reviews, and dashboard verification.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Ensure required logs are present, flowing, and usable; identify and escalate gaps in coverage.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Support continuous improvement by documenting operational pain points and recurring failures for engineering follow-up‑.</span></li></ul><p><span style="font-size: 12pt;"><strong>Compliance &amp; Audit Operations</strong></span></p><ul><li style="font-size: 12pt;"><span style="font-size: 12pt;">Produce and maintain security artifacts required for audits, customer assurance, and regulatory reviews.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Own recurring security operational tasks tied to compliance (e.g., access reviews, log review evidence, vulnerability reports).</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Ensure evidence is complete, reproducible, and stored according to defined standards.</span></li></ul><p><span style="font-size: 12pt;"><strong>Process &amp; Runbook Ownership</strong></span></p><ul><li style="font-size: 12pt;"><span style="font-size: 12pt;">Maintain and improve security operations runbooks, checklists, and standard operating procedures.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Help normalize and standardize how security work is requested, tracked, and completed across teams.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Identify opportunities to reduce manual effort through better workflow design or handoff to engineering for automation.</span></li></ul><p><span style="font-size: 12pt;"><strong>What You Bring to the Team</strong></span></p><ul><li style="font-size: 12pt;"><span style="font-size: 12pt;">3–6 years of experience in security operations, cloud operations, or SRE-adjacent‑ roles.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Strong experience operating security tooling such as cloud security posture management (CSPM), SIEM, endpoint protection, or DLP platforms.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Hands-on familiarity with cloud environments (AWS and/or Azure) and common operational security controls.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Experience managing work through ticketing systems (e.g., Jira) with a focus on clarity, prioritization, and follow-through.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Strong understanding of operational security concepts, including vulnerability management, least privilege, logging, and auditability.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Ability to work calmly across many parallel work items and maintain operational discipline.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Clear written and verbal communication skills, especially when coordinating across teams.</span></li></ul><p><span style="font-size: 12pt;"><strong>What we would like to see, but not required</strong></span></p><ul><li style="font-size: 12pt;"><span style="font-size: 12pt;">Experience supporting regulated environments (e.g., healthcare, HITRUST, SOC 2).</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Familiarity with tools such as Wiz, Splunk, Microsoft Defender, or equivalent platforms.</span></li><li style="font-size: 12pt;"><span style="font-size: 12pt;">Experience supporting audit cycles or customer security reviews.</span></li><li><span style="font-size: 12pt;">Exposure to Infrastructure-As-Code or automation pipelines (ability to identify‑ when automation is needed, not necessarily build it).</span></li><li><span style="font-size: 12pt;">AWS Security certification and/or Azure Security equivalent certifications are a plus&nbsp;<br></span></li></ul><p>&nbsp;</p><p><span style="font-size: 12pt;"><strong style="font-family: helvetica, arial, sans-serif;">Compensation: </strong><span style="font-family: helvetica, arial, sans-serif;">Compensation for this role is based on experience, skills, and location, and includes base salary plus eligibility for performance bonuses and equity grants.</span></span></p><p><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;"><strong>What you’ll get in return:</strong></span></p><ul><li style="font-size: 12pt;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">Unlimited paid time off&nbsp;– recharge when you need it</span></li><li style="font-size: 12pt;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">Work from anywhere&nbsp;– flexibility to fit your life</span></li><li style="font-size: 12pt;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">Comprehensive health coverage&nbsp;– multiple plan options to choose from</span></li><li style="font-size: 12pt;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">Equity for every employee&nbsp;– share in our success</span></li><li style="font-size: 12pt;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">Growth-focused environment&nbsp;– your development matters here</span></li><li style="font-size: 12pt;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">Home office setup allowance&nbsp;– one-time support to get you started</span></li><li><span style="font-size: 12pt;"><span style="font-family: helvetica, arial, sans-serif;">Monthly cell phone allowance – stay connected with ease</span> </span><span style="font-size: 12pt; font-family: helvetica, arial, sans-serif;"><span style="color: rgb(236, 240, 241); font-size: 10pt;"><span style="font-size: 10pt;"><span style="color: rgb(236, 240, 241); font-size: 12pt;">#</span><span style="font-family: helvetica, arial, sans-serif; color: rgb(236, 240, 241);"><span style="font-size: 12pt;">L</span>I-SB1 <span style="font-size: 12pt; font-family: helvetica, arial, sans-serif;"><span style="color: rgb(236, 240, 241); font-size: 10pt;">#</span></span><span style="color: rgb(236, 240, 241);">LI-Remote</span></span></span></span></span></li></ul><p>&nbsp;</p><p>&nbsp;</p><div class="content-conclusion"><p class="p1"><span style="font-size: 12pt; font-family: helvetica, arial, sans-serif;"><strong>Our Commitment as an Equal Opportunity Employer</strong></span></p><p class="p1"><span style="font-size: 12pt; font-family: helvetica, arial, sans-serif;">As a mission-led technology company helping to drive better healthcare outcomes, Abacus Insights believes that the best innovation and value we can bring to our customers comes from diverse ideas, thoughts, experiences, and perspectives. Therefore, we dedicate resources to building diverse teams and providing equal employment opportunities to all applicants. Abacus prohibits discrimination and harassment regarding race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.</span></p><p class="p1"><span style="font-size: 12pt; font-family: helvetica, arial, sans-serif;">At the heart of who we are is a commitment to continuously and intentionally building an inclusive culture—one that empowers every team member across the globe to do their best work and bring their authentic selves. We carry that same commitment into our hiring process, aiming to create an interview experience where you feel comfortable and confident showcasing your strengths. If there’s anything we can do to support that—big or small—please let us know.</span></p></div>

Loading similar jobs...

USA Remote Jobs

Discover fully remote job opportunities in the United States at USA Remote Jobs. Apply for roles like Software Developer, Customer Service Specialist, Project Manager, and more!

© 2026 Created by USA Remote Jobs. All rights reserved.