Logo
Get Well

Security Engineer

Get Well, Bethesda, Maryland, us, 20811

Save Job

Overview Base pay range $110,000.00/yr - $130,000.00/yr

Position Title:

Security Engineer

Reporting to:

Chief Information Security Officer

Location/Travel:

This position can be based remotely in the US, or based in our Bethesda, MD HQ

Opportunity As a cloud first organization we’re looking for a hands-on Security Engineer with deep Linux in AWS expertise highlighted with strong DevOps/DevSecOps experience. You’ll harden our Linux estates, embed security into our build/deploy pipelines, and partner with engineering to ship secure software at speed.

What Success Looks Like (First 6-12 Months)

Baseline Linux hardening and patch automation rolled out with ≥95% fleet compliance

CI/CD pipelines enforce SAST/SCA/IaC policy gates with

Fargate/ECS/ECR admission policies block noncompliant images; image signing is enforced for production

Actionable detections added to SIEM; MTTD/MTTR measurably reduced quarter-over-quarter

Leverage AI to analyze complex datasets, identify patterns, and categorize insights. Develop and deploy custom utilities and automation tools to accelerate data-driven decision-making and enhance operational efficiency across the organization

Fine tune alerts, including utilizing automation and AI.

Tech You’ll Use Linux (Debian/Ubuntu/RHEL/Alpine), Docker, Terraform, Terragrunt, Ansible, GitLab, AWS (IAM), snyk/Dependabot/Depency Track, Semgrep, OWASP ZAP/Burp Suite Pro/Enterprise.

How We Work

Automation first: we encode controls in code and enforce via pipelines and platforms

Secure defaults: opinionated templates and guardrails beat manual checklists

Measure & improve: we track risk reduction, time-to-patch, and detection efficacy as some of our metrics

Responsibilities

Linux security across servers, containers, and endpoints: hardening (CIS/NIST baselines), patching, kernel/module controls, eBPF/AppArmor/SELinux, SSH and PAM policies, and key management

Build security into CI/CD: design guardrails and automate checks (SAST/DAST/SCA, secrets scanning, IaC policy-as-code) in tools like GitLab

Cloud & container security: implement least-privilege IAM; secure VPC/VNet design; KMS usage; Secrets manager hardening; image signing, admission controllers, runtime controls, and registry policies

IaC & platform: create secure-by-default Terraform/Terragrunt modules; codify baseline controls; maintain reusable templates and golden AMIs/images

Threat modeling & reviews: conduct design reviews, STRIDE-style threat models, and pre-prod security sign-offs for new services

Vuln management: run scans (hosts/containers/dependencies), triage findings, drive remediation SLAs, and report risk posture, with tools from Rapid7 and or Wazuh.

Detection & response: tune EDR/agent configs, ship logs, build detections in SIEM, participate in on-call/IR, and run post-incident learnings

Secrets & identity: manage/monitor KMS, rotate credentials, and implement workload identity/federation for humans and services

Compliance enablement: map controls to SOC 2/HITRUST/FedRAMP Moderate/NIST; produce evidence via automation; partnering with GRC for audits

Advocacy & enablement: create docs/runbooks, lead brown-bags, and coach teams on secure coding and platform usage.

Requirements

4-7+ years in security engineering, platform security, or SRE with a security focus

Expert-level Linux administration and hardening (kernel, access controls, networking, filesystems, systemd)

Understanding of and exposure to current AI/LLM models and use cases.

Strong DevOps/DevSecOps background: CI/CD design, artifact management, environment promotion, and policy-as-code

Proficiency in Python and/or Bash and in automating security tasks at scale

Hands-on with cloud IAM, networking, and encryption fundamentals (VPCs, security groups, TLS/mTLS, KMS, PKI)

Experience operating containers securely (RBAC, PSP replacement, network policies, secrets, admission controls)

Demonstrated work with vulnerability management, dependency scanning, and remediation workflows

Familiarity with SIEM/EDR, log pipelines, and incident response practices

Solid understanding of network security (routing, firewalls, DNS, TLS, SSH, VPNs, proxies)

Excellent collaboration and communication with developers, SRE, and GRC

Adhere to all organizational information security policies and protect all sensitive information including but not limited to ePHI and PHI in accordance with organizational policy and Federal, State, and local regulations

Even Better

Experience with supply-chain security (Sigstore, SBOMs, provenance/attestations)

Exposure to secret zeroization and key lifecycle management

Prior work mapping/implementing SOC 2, HITRUST, FedRAMP Moderate, ISO 27001, NIST 800-53/1900 controls

Certifications (nice but not required): OSCP/OSWP, CISSP, GSEC, GCIA, GCSA, CKA/CKS

About Get Well Now part of the SAI Group family, Get Well is redefining digital patient engagement by putting patients in control of their personalized healthcare journeys, both inside and outside the hospital. Get Well is combining high-tech AI navigation with high-touch care experiences driving patient activation, loyalty, and outcomes while reducing the cost of care. For almost 25 years, Get Well has served more than 10 million patients per year across over 1,000 hospitals and clinical partner sites, working to use longitudinal data analytics to better serve patients and clinicians. AI innovator SAI Group led by Chairman Romesh Wadhwani is the lead growth investor in Get Well. Get Well’s award-winning solutions were recognized again in 2024 by KLAS Research and AVIA Marketplace. Learn more at Get Well and follow-us on LinkedInand Twitter.

When it comes to careers, our approach is simple: empower employees to do their best work and live their best professional and personal lives. Meeting the needs of a diverse group of employees across more than 30 states means offering tools to support financial, physical and emotional well-being and the choice to design what meets your needs. You’ll find everything you’d expect and many things you don’t: exceptionally generous paid time away from work, a variety of paid leave programs, savings opportunities with 401(k) and incentive plans, internal education programs, full array of health benefits, fitness reimbursement, cell phone subsidy, casual offices with snacks and drinks, peer recognition programs, health advocacy and employee assistance programs, chili cook-offs, pet insurance (yes, really) and so much more. Our most valuable benefit? An environment that supports YOU. The estimated pay range for this position is $110,000 - $130,000 in base salary plus bonus. Base salary is dependent on many factors including, but not limited to education, experience and skills. This range is subject to change and may be modified in the future.

Get Well is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age or veteran status.

Powered by JazzHR

ri8gpGgYrR

Seniority level

Mid-Senior level

Employment type

Full-time

Job function

Information Technology

Industries

Internet Publishing

Referrals increase your chances of interviewing at Get Well by 2x

Security Engineer with Cloud Operations - 100% Remote Cybersecurity Engineer (SOAR) [JOB ID 20250725] Reston, VA $110,000 - $135,000 2 months ago

Cybersecurity Engineer (SOAR) [JOB ID 20250725] Washington, DC $125,000 - $170,000 1 week ago

Washington, DC $120,000 - $170,000 1 week ago

Arlington, VA $65,000 - $75,000 2 weeks ago

Network Reliability Engineer - Remote (1772) District of Columbia, United States $100,000 - $105,000 1 month ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr