Get Well
Overview
Base pay range
$110,000.00/yr - $130,000.00/yr
Position Title:
Security Engineer
Reporting to:
Chief Information Security Officer
Location/Travel:
This position can be based remotely in the US, or based in our Bethesda, MD HQ
Opportunity As a cloud first organization we’re looking for a hands-on Security Engineer with deep Linux in AWS expertise highlighted with strong DevOps/DevSecOps experience. You’ll harden our Linux estates, embed security into our build/deploy pipelines, and partner with engineering to ship secure software at speed.
What Success Looks Like (First 6-12 Months)
Baseline Linux hardening and patch automation rolled out with ≥95% fleet compliance
CI/CD pipelines enforce SAST/SCA/IaC policy gates with
Fargate/ECS/ECR admission policies block noncompliant images; image signing is enforced for production
Actionable detections added to SIEM; MTTD/MTTR measurably reduced quarter-over-quarter
Leverage AI to analyze complex datasets, identify patterns, and categorize insights. Develop and deploy custom utilities and automation tools to accelerate data-driven decision-making and enhance operational efficiency across the organization
Fine tune alerts, including utilizing automation and AI.
Tech You’ll Use Linux (Debian/Ubuntu/RHEL/Alpine), Docker, Terraform, Terragrunt, Ansible, GitLab, AWS (IAM), snyk/Dependabot/Depency Track, Semgrep, OWASP ZAP/Burp Suite Pro/Enterprise.
How We Work
Automation first: we encode controls in code and enforce via pipelines and platforms
Secure defaults: opinionated templates and guardrails beat manual checklists
Measure & improve: we track risk reduction, time-to-patch, and detection efficacy as some of our metrics
Responsibilities
Linux security across servers, containers, and endpoints: hardening (CIS/NIST baselines), patching, kernel/module controls, eBPF/AppArmor/SELinux, SSH and PAM policies, and key management
Build security into CI/CD: design guardrails and automate checks (SAST/DAST/SCA, secrets scanning, IaC policy-as-code) in tools like GitLab
Cloud & container security: implement least-privilege IAM; secure VPC/VNet design; KMS usage; Secrets manager hardening; image signing, admission controllers, runtime controls, and registry policies
IaC & platform: create secure-by-default Terraform/Terragrunt modules; codify baseline controls; maintain reusable templates and golden AMIs/images
Threat modeling & reviews: conduct design reviews, STRIDE-style threat models, and pre-prod security sign-offs for new services
Vuln management: run scans (hosts/containers/dependencies), triage findings, drive remediation SLAs, and report risk posture, with tools from Rapid7 and or Wazuh.
Detection & response: tune EDR/agent configs, ship logs, build detections in SIEM, participate in on-call/IR, and run post-incident learnings
Secrets & identity: manage/monitor KMS, rotate credentials, and implement workload identity/federation for humans and services
Compliance enablement: map controls to SOC 2/HITRUST/FedRAMP Moderate/NIST; produce evidence via automation; partnering with GRC for audits
Advocacy & enablement: create docs/runbooks, lead brown-bags, and coach teams on secure coding and platform usage.
Requirements
4-7+ years in security engineering, platform security, or SRE with a security focus
Expert-level Linux administration and hardening (kernel, access controls, networking, filesystems, systemd)
Understanding of and exposure to current AI/LLM models and use cases.
Strong DevOps/DevSecOps background: CI/CD design, artifact management, environment promotion, and policy-as-code
Proficiency in Python and/or Bash and in automating security tasks at scale
Hands-on with cloud IAM, networking, and encryption fundamentals (VPCs, security groups, TLS/mTLS, KMS, PKI)
Experience operating containers securely (RBAC, PSP replacement, network policies, secrets, admission controls)
Demonstrated work with vulnerability management, dependency scanning, and remediation workflows
Familiarity with SIEM/EDR, log pipelines, and incident response practices
Solid understanding of network security (routing, firewalls, DNS, TLS, SSH, VPNs, proxies)
Excellent collaboration and communication with developers, SRE, and GRC
Adhere to all organizational information security policies and protect all sensitive information including but not limited to ePHI and PHI in accordance with organizational policy and Federal, State, and local regulations
Even Better
Experience with supply-chain security (Sigstore, SBOMs, provenance/attestations)
Exposure to secret zeroization and key lifecycle management
Prior work mapping/implementing SOC 2, HITRUST, FedRAMP Moderate, ISO 27001, NIST 800-53/1900 controls
Certifications (nice but not required): OSCP/OSWP, CISSP, GSEC, GCIA, GCSA, CKA/CKS
About Get Well Now part of the SAI Group family, Get Well is redefining digital patient engagement by putting patients in control of their personalized healthcare journeys, both inside and outside the hospital. Get Well is combining high-tech AI navigation with high-touch care experiences driving patient activation, loyalty, and outcomes while reducing the cost of care. For almost 25 years, Get Well has served more than 10 million patients per year across over 1,000 hospitals and clinical partner sites, working to use longitudinal data analytics to better serve patients and clinicians. AI innovator SAI Group led by Chairman Romesh Wadhwani is the lead growth investor in Get Well. Get Well’s award-winning solutions were recognized again in 2024 by KLAS Research and AVIA Marketplace. Learn more at Get Well and follow-us on LinkedInand Twitter.
When it comes to careers, our approach is simple: empower employees to do their best work and live their best professional and personal lives. Meeting the needs of a diverse group of employees across more than 30 states means offering tools to support financial, physical and emotional well-being and the choice to design what meets your needs. You’ll find everything you’d expect and many things you don’t: exceptionally generous paid time away from work, a variety of paid leave programs, savings opportunities with 401(k) and incentive plans, internal education programs, full array of health benefits, fitness reimbursement, cell phone subsidy, casual offices with snacks and drinks, peer recognition programs, health advocacy and employee assistance programs, chili cook-offs, pet insurance (yes, really) and so much more. Our most valuable benefit? An environment that supports YOU. The estimated pay range for this position is $110,000 - $130,000 in base salary plus bonus. Base salary is dependent on many factors including, but not limited to education, experience and skills. This range is subject to change and may be modified in the future.
Get Well is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age or veteran status.
Powered by JazzHR
ri8gpGgYrR
Seniority level
Mid-Senior level
Employment type
Full-time
Job function
Information Technology
Industries
Internet Publishing
Referrals increase your chances of interviewing at Get Well by 2x
Security Engineer with Cloud Operations - 100% Remote Cybersecurity Engineer (SOAR) [JOB ID 20250725] Reston, VA $110,000 - $135,000 2 months ago
Cybersecurity Engineer (SOAR) [JOB ID 20250725] Washington, DC $125,000 - $170,000 1 week ago
Washington, DC $120,000 - $170,000 1 week ago
Arlington, VA $65,000 - $75,000 2 weeks ago
Network Reliability Engineer - Remote (1772) District of Columbia, United States $100,000 - $105,000 1 month ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Position Title:
Security Engineer
Reporting to:
Chief Information Security Officer
Location/Travel:
This position can be based remotely in the US, or based in our Bethesda, MD HQ
Opportunity As a cloud first organization we’re looking for a hands-on Security Engineer with deep Linux in AWS expertise highlighted with strong DevOps/DevSecOps experience. You’ll harden our Linux estates, embed security into our build/deploy pipelines, and partner with engineering to ship secure software at speed.
What Success Looks Like (First 6-12 Months)
Baseline Linux hardening and patch automation rolled out with ≥95% fleet compliance
CI/CD pipelines enforce SAST/SCA/IaC policy gates with
Fargate/ECS/ECR admission policies block noncompliant images; image signing is enforced for production
Actionable detections added to SIEM; MTTD/MTTR measurably reduced quarter-over-quarter
Leverage AI to analyze complex datasets, identify patterns, and categorize insights. Develop and deploy custom utilities and automation tools to accelerate data-driven decision-making and enhance operational efficiency across the organization
Fine tune alerts, including utilizing automation and AI.
Tech You’ll Use Linux (Debian/Ubuntu/RHEL/Alpine), Docker, Terraform, Terragrunt, Ansible, GitLab, AWS (IAM), snyk/Dependabot/Depency Track, Semgrep, OWASP ZAP/Burp Suite Pro/Enterprise.
How We Work
Automation first: we encode controls in code and enforce via pipelines and platforms
Secure defaults: opinionated templates and guardrails beat manual checklists
Measure & improve: we track risk reduction, time-to-patch, and detection efficacy as some of our metrics
Responsibilities
Linux security across servers, containers, and endpoints: hardening (CIS/NIST baselines), patching, kernel/module controls, eBPF/AppArmor/SELinux, SSH and PAM policies, and key management
Build security into CI/CD: design guardrails and automate checks (SAST/DAST/SCA, secrets scanning, IaC policy-as-code) in tools like GitLab
Cloud & container security: implement least-privilege IAM; secure VPC/VNet design; KMS usage; Secrets manager hardening; image signing, admission controllers, runtime controls, and registry policies
IaC & platform: create secure-by-default Terraform/Terragrunt modules; codify baseline controls; maintain reusable templates and golden AMIs/images
Threat modeling & reviews: conduct design reviews, STRIDE-style threat models, and pre-prod security sign-offs for new services
Vuln management: run scans (hosts/containers/dependencies), triage findings, drive remediation SLAs, and report risk posture, with tools from Rapid7 and or Wazuh.
Detection & response: tune EDR/agent configs, ship logs, build detections in SIEM, participate in on-call/IR, and run post-incident learnings
Secrets & identity: manage/monitor KMS, rotate credentials, and implement workload identity/federation for humans and services
Compliance enablement: map controls to SOC 2/HITRUST/FedRAMP Moderate/NIST; produce evidence via automation; partnering with GRC for audits
Advocacy & enablement: create docs/runbooks, lead brown-bags, and coach teams on secure coding and platform usage.
Requirements
4-7+ years in security engineering, platform security, or SRE with a security focus
Expert-level Linux administration and hardening (kernel, access controls, networking, filesystems, systemd)
Understanding of and exposure to current AI/LLM models and use cases.
Strong DevOps/DevSecOps background: CI/CD design, artifact management, environment promotion, and policy-as-code
Proficiency in Python and/or Bash and in automating security tasks at scale
Hands-on with cloud IAM, networking, and encryption fundamentals (VPCs, security groups, TLS/mTLS, KMS, PKI)
Experience operating containers securely (RBAC, PSP replacement, network policies, secrets, admission controls)
Demonstrated work with vulnerability management, dependency scanning, and remediation workflows
Familiarity with SIEM/EDR, log pipelines, and incident response practices
Solid understanding of network security (routing, firewalls, DNS, TLS, SSH, VPNs, proxies)
Excellent collaboration and communication with developers, SRE, and GRC
Adhere to all organizational information security policies and protect all sensitive information including but not limited to ePHI and PHI in accordance with organizational policy and Federal, State, and local regulations
Even Better
Experience with supply-chain security (Sigstore, SBOMs, provenance/attestations)
Exposure to secret zeroization and key lifecycle management
Prior work mapping/implementing SOC 2, HITRUST, FedRAMP Moderate, ISO 27001, NIST 800-53/1900 controls
Certifications (nice but not required): OSCP/OSWP, CISSP, GSEC, GCIA, GCSA, CKA/CKS
About Get Well Now part of the SAI Group family, Get Well is redefining digital patient engagement by putting patients in control of their personalized healthcare journeys, both inside and outside the hospital. Get Well is combining high-tech AI navigation with high-touch care experiences driving patient activation, loyalty, and outcomes while reducing the cost of care. For almost 25 years, Get Well has served more than 10 million patients per year across over 1,000 hospitals and clinical partner sites, working to use longitudinal data analytics to better serve patients and clinicians. AI innovator SAI Group led by Chairman Romesh Wadhwani is the lead growth investor in Get Well. Get Well’s award-winning solutions were recognized again in 2024 by KLAS Research and AVIA Marketplace. Learn more at Get Well and follow-us on LinkedInand Twitter.
When it comes to careers, our approach is simple: empower employees to do their best work and live their best professional and personal lives. Meeting the needs of a diverse group of employees across more than 30 states means offering tools to support financial, physical and emotional well-being and the choice to design what meets your needs. You’ll find everything you’d expect and many things you don’t: exceptionally generous paid time away from work, a variety of paid leave programs, savings opportunities with 401(k) and incentive plans, internal education programs, full array of health benefits, fitness reimbursement, cell phone subsidy, casual offices with snacks and drinks, peer recognition programs, health advocacy and employee assistance programs, chili cook-offs, pet insurance (yes, really) and so much more. Our most valuable benefit? An environment that supports YOU. The estimated pay range for this position is $110,000 - $130,000 in base salary plus bonus. Base salary is dependent on many factors including, but not limited to education, experience and skills. This range is subject to change and may be modified in the future.
Get Well is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age or veteran status.
Powered by JazzHR
ri8gpGgYrR
Seniority level
Mid-Senior level
Employment type
Full-time
Job function
Information Technology
Industries
Internet Publishing
Referrals increase your chances of interviewing at Get Well by 2x
Security Engineer with Cloud Operations - 100% Remote Cybersecurity Engineer (SOAR) [JOB ID 20250725] Reston, VA $110,000 - $135,000 2 months ago
Cybersecurity Engineer (SOAR) [JOB ID 20250725] Washington, DC $125,000 - $170,000 1 week ago
Washington, DC $120,000 - $170,000 1 week ago
Arlington, VA $65,000 - $75,000 2 weeks ago
Network Reliability Engineer - Remote (1772) District of Columbia, United States $100,000 - $105,000 1 month ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr