Minted
Role Overview
As a Security Analyst II at Minted, you will help protect both the customer‑facing products our community relies on and the enterprise systems our employees use every day.
You’ll join a small, highly collaborative security team, offering hands‑on exposure across application security, cloud security, identity, and security operations. This role provides meaningful ownership early on, close mentorship, and strong growth opportunities as Minted’s security program continues to mature.
Responsibilities Application & Product Security
Support the security of Minted’s applications and AWS cloud infrastructure in close partnership with engineering teams.
Monitor and investigate security events in AWS using GuardDuty, Security Hub, Cloudflare, and SIEM‑integrated logs.
Review, triage, and track application security findings from Semgrep.
Analyze vulnerability severity, impact, and exploitability.
Partner with engineering and DevOps to validate findings and drive remediation.
Identify cloud misconfigurations, exposed resources, and risky IAM patterns.
Contribute to improving application and cloud security visibility, alerting, and automation.
Participate in post‑incident reviews related to application or cloud security events.
IT & Enterprise Security
You will help protect Minted’s corporate systems, identities, and endpoints by detecting and responding to security incidents.
Monitor and triage alerts from CrowdStrike, identity providers, and centralized logging tools.
Investigate phishing attempts, endpoint malware, suspicious login activity, and account compromise.
Execute incident response actions following established playbooks.
Support identity and access management across Okta, Google Workspace, and AWS SSO, with an emphasis on least privilege.
Conduct periodic access reviews and assist with improving IAM processes.
Partner with IT teams to improve endpoint security posture and response workflows.
Security Operations & Early Impact First 90 Days
Ramp up on Minted’s environment and security tooling with hands‑on mentorship.
Review and triage security alerts across cloud, endpoint, and identity systems.
Complete a defined IAM access review across Okta, Google Workspace, and AWS SSO.
Use Python to support investigations, reporting, and data enrichment.
First 6 Months
Independently investigate common security alerts and respond to incidents.
Contribute to implementing a SIEM and establishing foundational SOC processes.
Assist with log onboarding, alert tuning, and detection improvement.
Help document runbooks and response procedures.
Shared Responsibilities
Perform vulnerability scanning and support risk‑based remediation tracking.
Identify recurring security issues or trends and recommend improvements.
Maintain clear documentation of incidents, investigations, and lessons learned.
Support SOC 2 and PCI DSS evidence collection.
Partner with IT and engineering teams to improve monitoring, logging, and visibility.
Identify opportunities to improve security processes, tooling, and automation.
Tooling You’ll Work With
Cloud & Infrastructure: AWS, GuardDuty, Security Hub, Cloudflare.
Application Security: Semgrep.
Endpoint Security: CrowdStrike.
Identity & Access: Okta, Google Workspace, AWS SSO.
Security Operations: SIEM.
You Are
Analytical, curious, and detail‑oriented, with a strong interest in security investigations.
Calm and methodical under pressure, with solid problem‑solving skills.
Collaborative and communicative across technical and non‑technical teams.
Proactive about learning and improving security processes and tooling.
You Have
Bachelor’s degree in Cybersecurity, Computer Science, or a related field, or equivalent experience.
2–4 years of experience in security operations, incident response, or IT security.
Strong understanding of cybersecurity fundamentals (CIA triad, defense‑in‑depth, least privilege, MITRE ATT&CK).
Hands‑on experience with several of the tools listed above.
Basic Python scripting skills for automation, log analysis, or reporting.
Strong written and verbal communication skills.
Bonus Points
Experience with security automation or SOAR tools.
Familiarity with SOC 2 or PCI DSS.
Security certifications such as Security+, CySA+, or similar.
Compensation The compensation range for the role applies to employment offers from Minted. Our employment offers fall between the minimum and midpoint of the range to allow for continued salary growth during your employment at Minted. The upper half of the range accommodates this growth and supports our intention to create an environment that encourages lasting relationships between Minted and our employees.
Geo Base Full Salary Range 0 - Includes SF Bay Area $72,391- $95,013
Salaries will vary based on various factors, including, but not limited to, professional and academic experience, associated job responsibilities, and/or other business or organizational needs.
Benefits
Medical, Dental, and Vision Benefits
Employer Funded Health Savings Account
10 Paid Holidays
Paid Time Off and Sick Leave
Paid Parental Leave
Monthly Gym/Wellness Reimbursement
401(k) retirement savings plan
Employer Funded Commuter Benefits
Employee Discount
Friends and Family Discount
Disclaimer We verify identity at the start of interviews to ensure fairness and security. We reserve the right to withdraw candidates who misrepresent their identity, experience, or qualifications at any stage of the process.
Notice of AI Use in Employment Decisions We use AI‑powered tools, including Brainner AI, to support our hiring and employment processes. These tools help assess job‑related qualifications and improve efficiency, but all decisions involve human review.
Equal Opportunity Employer Minted is an Equal Opportunity Employer committed to inclusion and diversity. We welcome people of different backgrounds, experiences, abilities and perspectives and will consider all qualified applicants for employment in accordance with all state, local, and federal laws. Minted participates in the E‑verify program.
#J-18808-Ljbffr
You’ll join a small, highly collaborative security team, offering hands‑on exposure across application security, cloud security, identity, and security operations. This role provides meaningful ownership early on, close mentorship, and strong growth opportunities as Minted’s security program continues to mature.
Responsibilities Application & Product Security
Support the security of Minted’s applications and AWS cloud infrastructure in close partnership with engineering teams.
Monitor and investigate security events in AWS using GuardDuty, Security Hub, Cloudflare, and SIEM‑integrated logs.
Review, triage, and track application security findings from Semgrep.
Analyze vulnerability severity, impact, and exploitability.
Partner with engineering and DevOps to validate findings and drive remediation.
Identify cloud misconfigurations, exposed resources, and risky IAM patterns.
Contribute to improving application and cloud security visibility, alerting, and automation.
Participate in post‑incident reviews related to application or cloud security events.
IT & Enterprise Security
You will help protect Minted’s corporate systems, identities, and endpoints by detecting and responding to security incidents.
Monitor and triage alerts from CrowdStrike, identity providers, and centralized logging tools.
Investigate phishing attempts, endpoint malware, suspicious login activity, and account compromise.
Execute incident response actions following established playbooks.
Support identity and access management across Okta, Google Workspace, and AWS SSO, with an emphasis on least privilege.
Conduct periodic access reviews and assist with improving IAM processes.
Partner with IT teams to improve endpoint security posture and response workflows.
Security Operations & Early Impact First 90 Days
Ramp up on Minted’s environment and security tooling with hands‑on mentorship.
Review and triage security alerts across cloud, endpoint, and identity systems.
Complete a defined IAM access review across Okta, Google Workspace, and AWS SSO.
Use Python to support investigations, reporting, and data enrichment.
First 6 Months
Independently investigate common security alerts and respond to incidents.
Contribute to implementing a SIEM and establishing foundational SOC processes.
Assist with log onboarding, alert tuning, and detection improvement.
Help document runbooks and response procedures.
Shared Responsibilities
Perform vulnerability scanning and support risk‑based remediation tracking.
Identify recurring security issues or trends and recommend improvements.
Maintain clear documentation of incidents, investigations, and lessons learned.
Support SOC 2 and PCI DSS evidence collection.
Partner with IT and engineering teams to improve monitoring, logging, and visibility.
Identify opportunities to improve security processes, tooling, and automation.
Tooling You’ll Work With
Cloud & Infrastructure: AWS, GuardDuty, Security Hub, Cloudflare.
Application Security: Semgrep.
Endpoint Security: CrowdStrike.
Identity & Access: Okta, Google Workspace, AWS SSO.
Security Operations: SIEM.
You Are
Analytical, curious, and detail‑oriented, with a strong interest in security investigations.
Calm and methodical under pressure, with solid problem‑solving skills.
Collaborative and communicative across technical and non‑technical teams.
Proactive about learning and improving security processes and tooling.
You Have
Bachelor’s degree in Cybersecurity, Computer Science, or a related field, or equivalent experience.
2–4 years of experience in security operations, incident response, or IT security.
Strong understanding of cybersecurity fundamentals (CIA triad, defense‑in‑depth, least privilege, MITRE ATT&CK).
Hands‑on experience with several of the tools listed above.
Basic Python scripting skills for automation, log analysis, or reporting.
Strong written and verbal communication skills.
Bonus Points
Experience with security automation or SOAR tools.
Familiarity with SOC 2 or PCI DSS.
Security certifications such as Security+, CySA+, or similar.
Compensation The compensation range for the role applies to employment offers from Minted. Our employment offers fall between the minimum and midpoint of the range to allow for continued salary growth during your employment at Minted. The upper half of the range accommodates this growth and supports our intention to create an environment that encourages lasting relationships between Minted and our employees.
Geo Base Full Salary Range 0 - Includes SF Bay Area $72,391- $95,013
Salaries will vary based on various factors, including, but not limited to, professional and academic experience, associated job responsibilities, and/or other business or organizational needs.
Benefits
Medical, Dental, and Vision Benefits
Employer Funded Health Savings Account
10 Paid Holidays
Paid Time Off and Sick Leave
Paid Parental Leave
Monthly Gym/Wellness Reimbursement
401(k) retirement savings plan
Employer Funded Commuter Benefits
Employee Discount
Friends and Family Discount
Disclaimer We verify identity at the start of interviews to ensure fairness and security. We reserve the right to withdraw candidates who misrepresent their identity, experience, or qualifications at any stage of the process.
Notice of AI Use in Employment Decisions We use AI‑powered tools, including Brainner AI, to support our hiring and employment processes. These tools help assess job‑related qualifications and improve efficiency, but all decisions involve human review.
Equal Opportunity Employer Minted is an Equal Opportunity Employer committed to inclusion and diversity. We welcome people of different backgrounds, experiences, abilities and perspectives and will consider all qualified applicants for employment in accordance with all state, local, and federal laws. Minted participates in the E‑verify program.
#J-18808-Ljbffr