Job Specifications
About League
Founded in 2014, League is the leading healthcare consumer experience (CX) platform, powered by artificial intelligence (AI), reaching more than 63 million people around the world and delivering the highest level of personalization in the industry. Payers, providers, and consumer health partners build on League’s platform to deliver high-engagement healthcare solutions proven to improve health outcomes. League has raised over $285 million in venture capital funding to date, powering the digital experiences for some of healthcare’s most trusted brands, including Highmark Health, Manulife, Medibank, and Shoppers Drug Mart.
Position Summary
League’s Security Engineering teams are responsible for scaling security in the development lifecycle and managing security incident management. We believe in security by design and follow a paved road philosophy by building or buying tools that we can integrate into our platform to ultimately make it easier for our engineers to do the right thing. As a Senior SecOps Engineer you will care deeply about “what goes bump in the night”. You have peers in Security Engineering who care about “build it secure” at League, your role is to ensure both validation and response occurs when inevitable challenges arise. This role will focus on detection, response, tuning, and refinement. Security Engineers and Analysts on our SecOps team take pride in response.
As always, if this is your skillset we encourage you to apply. We also accept and encourage applicants who have existing software engineering experience and want to explore security and applicants who may have done a security program in a post-secondary institution. There are people across the engineering organization who are ready to help grow technical skills and who want to learn more about security.
About The Role
Security Monitoring and Incident Response:
Monitors security events and alerts from various sources (SIEM, endpoint detection, SASE, etc.) and analyzes them to identify potential security incidents.
Leads security incident response efforts, including investigation, containment, eradication, and recovery.
Develops and maintains incident response plans, playbooks, and procedures.
Coordinates with cross-functional teams (IT, Engineering, Legal, etc.) during security incidents.
Perform root cause analysis of security incidents and recommend preventive measures. Independently analyzes complex security incidents, identifying root causes and developing solutions and drives them to completion.
Participate in an on-call rotation.
Security Tooling and Automation:
Manage and maintain security tools and technologies, such as SIEM, EDR, and SASE platforms.
Develop and implement automation scripts and workflows to improve security operations efficiency and effectiveness.
Demonstrated ability to leverage GCP services (e.g., Cloud Functions, Cloud Run) to host and automate security scripts and tools for event enrichment and response.
Proficiency in utilizing GCP services like Pub/Sub, Dataflow, BigQuery, and Cloud Storage for data processing, analysis, and enrichment.
Evaluate and recommend new security tools and technologies to enhance our security posture.
Manage and maintain infrastructure through Terraform.
Threat Management:
Conduct threat research and analysis to identify emerging threats and vulnerabilities.
Develop and implement threat detection rules and use cases.
Security Engineering and Architecture:
Contribute to the design and implementation of security systems architectures and solutions.
Evaluate and recommend security controls for new and existing systems.
Ensure security best practices are followed in system development and implementation.
Collaboration and Communication:
Collaborate with other teams to ensure security is integrated into all aspects of the organization's operations.
Communicate security risks and issues to technical and non-technical audiences, including leadership.
Mentors and provides guidance to junior security analysts and engineers to develop their technical growth.
Compliance and Reporting:
Ensure compliance with relevant security standards and regulations (e.g., HITRUST, NIST, GDPR).
Prepare and present security reports to management.
Participate in routine audits within the organization
About You
Bachelor of Science degree (BS) in Computer Science (or a related field)
Minimum of 7 years in Cybersecurity with a strong focus on Incident Response, or
Minimum of 3 years in Security Operations with hands-on experience in SOAR and other automation tools.
Deep and broad technical understanding of security concepts, principles, and technologies.
Experience with security monitoring tools (e.g., SIEM, EDR), including configuration and administration of these tools.
Proven leading and coordinating incident response processes and methodologies.
Proficiency in scripting languages (e.g., Python, Go).
You have some Infrastructure as Code (Terraform, Ansible) experience or a strong desi
About the Company
Founded in 2014, League is a platform technology company powering next-generation healthcare consumer experiences. Payers, providers, consumer health partners and employers build on League’s platform to deliver high-engagement, personalized healthcare experiences consumers love. Millions of people use solutions powered by League to access, navigate and pay for care.
Know more