Second Front Systems (2F) is seeking an ambitious and visionary Security Engineer. The role involves building and securing cloud-native systems for the Game Warden platform while safeguarding mission-critical infrastructure for the DoD through automation and monitoring capabilities.
Responsibilities:
- Design, develop, and deploy security automation and monitoring microservices in Go (Golang)
- Build and maintain security automation and monitoring solutions with a focus on Azure environments, leveraging tools such as Microsoft Defender for Cloud, Azure Monitor, and Azure AD
- Enhance and maintain SIEM integrations, log pipelines, and threat detection logic across AWS, Kubernetes, and application layers
- Build infrastructure as code (IaC) with Pulumi in Go to securely deploy cloud-native services
- Develop and maintain incident detection and response automation, integrating with tools such as AWS Security Hub, GuardDuty, Inspector, Wazuh, and others
- Create and manage dashboards, alerts, and playbooks to support real-time monitoring and Blue Team operations
- Support threat-hunting initiatives through custom log enrichment, alert tuning, and behavioral detection
- Work closely with the other Security Engineers and the platform team to assess risk, harden configurations, and evolve security posture
- Document architectures, detection logic, and operational procedures to ensure repeatability and scalability
Requirements:
- U.S. citizenship due to government contract requirements
- Reside in one of the approved hiring hubs: DC/Maryland/Virginia, Raleigh/Durham/Chapel Hill, NC, Denver/Colorado Springs, CO, Dallas/Fort Worth, TX
- 3–5 years of experience in DevSecOps, Blue Team engineering, or security automation
- Strong experience developing tools and microservices in Go (Golang)
- Proficiency with Pulumi or similar Infrastructure-as-Code (IaC) frameworks
- Deep understanding of AWS security services, IAM, and networking fundamentals
- Experience with Kubernetes, Docker, and GitLab CI/CD pipelines
- Proven ability to analyze logs, correlate events, and respond to incidents
- Experience integrating or managing SIEMs (e.g., Wazuh, Elastic, Opensearch)
- Familiarity with threat detection, alerting, and response automation in cloud environments
- DoD Secret Clearance (active or eligible)
- DoD 8570/8140 compliant IAT2
- Certified AWS, CKA, CKAD, CySA+, Sec+, or DoD 8570/8140 compliant IAT2 OR Ability to attain DoD 8570 IAT Level II certification within 3 months of hire
- Hands-on experience with threat intelligence enrichment, behavioral analytics, or custom detections
- Familiarity with cilium, keycloak, kyverno, or tetragon for runtime security and observability
- Experience in data engineering or security data pipelines (PLG stack, cloudtrail, guardDuty)