Senior Security Engineer

Calendly (View all Jobs)

Remote - US

Please mention No Whiteboard if you apply!
I'm a one-man team looking to improve tech interviews, and could use any support! 😄


Interview Process

1. 45 min chat with engineering director 2. Take-home assignment 3. All day technical & cultural fit interview. Tech assessments include system design, extension of the takehome assignment, and bug fix pairing.

Salary

$188,800

Programming Languages Mentioned

Python, Swift


About the team & opportunity 

What’s so great about working on Calendly’s Security team? 

We make things possible for our customers through innovation.

Why do we need you? Well, we are looking for a Senior Security Engineer who will bring curiosity, technical knowledge and a desire to up-level the people around them. You will report to the Head of Security Operations and will be responsible for many of the key functions around security operations including incident response, enterprise level security, and enhancing threat detection capabilities. 

A day in the life of a Security Engineer at Calendly

On a typical day, you will be working on: 

  • Having familiarity with driving enterprise security and the projects surrounding it
  • Leading the Security Operations Center (SOC) team to monitor, detect, and respond to cybersecurity threats in a timely manner
  • Developing and implementing comprehensive incident response plans; managing and coordinating cybersecurity incidents from identification through resolution
  • Integrating various security and IT tools to enhance threat detection, incident response, and operational efficiency
  • Leveraging JIRA for creating and managing dashboards, reports, and metrics that support cybersecurity operations and decision-making
  • Conducting regular security assessments, audits, and continuous monitoring to identify vulnerabilities and ensure compliance with industry standards and regulations
  • Collaborating with IT and other departments to ensure cybersecurity best practices are integrated across the organization
  • Developing and maintaining up-to-date knowledge of the threat landscape, as well as advancements in cybersecurity technologies and methodologies
  • Mentoring and providing guidance to junior team members, fostering a culture of continuous learning and improvement
  • Preparing and presenting regular reports on incident trends, security posture, and the effectiveness of implemented security measures to senior management
  • Leading and optimizing the operations of our Security Operations Center (SOC), ensuring effective threat detection, analysis, and response activities
  • Developing, implementing, and overseeing incident response protocols and procedures to swiftly and effectively manage security incidents
  • Enhancing threat detection capabilities through the integration and tuning of security tools and technologies, including SIEM, EDR, firewalls, and intrusion detection systems
  • Ability to conduct advanced threat analysis to anticipate and mitigate potential security threats

What do we need from you?

  • A minimum of 5-7 years of experience in cybersecurity, with at least 4 years dedicated to security operations, a SOC environment and enterprise security
  • Demonstrated experience in incident response and management, including developing and implementing incident response plans and conducting post-incident analysis
  • Experience with JIRA or similar tools for creating dashboards, managing reports, and automating workflows to support cybersecurity operations
  • Proven track record in threat detection, analysis, and resolution, including the use of forensic tools for in-depth investigations
  • Expert knowledge in operating and configuring SIEM tools (e.g., Splunk, ELK) for real-time threat monitoring and analysis
  • Deep understanding of security technologies such as EDR (Endpoint Detection and Response), IDS/IPS (Intrusion Detection Systems/Intrusion Prevention Systems), firewalls, and vulnerability scanners
  • Proficient in scripting languages (e.g., Python, PowerShell) to automate SOC processes, enhance threat detection, and streamline incident responses
  • Relevant professional certifications such as CISSP (Certified Information Systems Security Professional), GCIH (GIAC Certified Incident Handler), GCFA (GIAC Certified Forensic Analyst), or OSCP (Offensive Security Certified Professional) are highly desirable
  • Authorized to work lawfully in the United States of America as Calendly does not engage in immigration sponsorship at this time

What’s in it for you? 

Ready to make a serious impact? Millions of people already rely on Calendly’s products, and we’re still in the midst of our growth curve — it’s a fantastic time to join us. Everything you’ll work on here will accelerate your career to the next level. If you want to learn, grow, and do the best work of your life alongside the best people you’ve ever worked with, then we hope you’ll consider allowing Calendly to be a part of your professional journey. 

Our Hiring Process:

We aim to provide an inclusive and equitable candidate experience to everyone who expresses interest in working at Calendly. To learn more about our hiring process, please visit our careers page at www.careers.calendly.com.

Once selected for an opportunity, the recruiter assigned to the role will keep you informed every step of the way. Have questions? Let your recruiter know! Want to share your experience? We are passionately committed to improving and building on our process, and we consider feedback a gift.

If you are an individual with a disability and would like to request a reasonable accommodation as part of the application or recruiting process, please contact us at recruiting@calendly.com . 

Calendly is registered as an employer in many, but not all, states. If you are located in Alaska, Hawaii, Montana, North Dakota, South Dakota, Nebraska, Iowa, and West Virginia, you will not be eligible for employment. Note that all individual roles will specify location eligibility.

All candidates can find our Candidate Privacy Statement here

Candidates residing in California may visit our Notice at Collection for California Candidates here: Notice at Collection

The ranges listed below are the expected annual base salary for this role, subject to change.

Calendly takes a number of factors into consideration when determining an employee’s starting salary, including relevant experience, relevant skills sets, interview performance, location/metropolitan area, and internal pay equity.

Base salary is just one component of Calendly’s total rewards package. All full-time (30 hours/week) employees are also eligible for our Quarterly Corporate Bonus program (or Sales incentive), equity awards, and competitive benefits.

Calendly uses the zip code of an employee’s remote work location, or the onsite building location if hybrid, to determine which metropolitan pay range we use. Current geographic zones are as follows:

  • Tier 1: San Francisco, CA, San Jose, CA, New York City, NY
  • Tier 2: Chicago, IL, Austin, TX, Denver, CO, Boston, MA, Washington D.C., Philadelphia, PA, Portland, OR, Seattle, WA, Miami, FL, and all other cities in CA.
  • Tier 3: All other locations not in Tier 1 or Tier 2
Tier 1 Salary
$188,800$255,200 USD
Tier 2 Salary
$173,000$234,000 USD
Tier 3 Salary
$157,300$212,700 USD

Please mention No Whiteboard if you apply!
I'm a one-man team looking to improve tech interviews, and could use any support! 😄


Get weekly alerts of new jobs from companies not using whiteboard interviews!