Corporate Security Engineer, Lead

Sierra Sierra · AI Frontier · San Francisco, CA · IT

Sierra is seeking a founding Corporate Security Engineer, Lead to define and build their corporate security function. This role will own the risk register, secure SaaS applications and integrations, design and implement enforcement systems, improve endpoint visibility, and shape the broader security roadmap. The ideal candidate has significant experience building security programs, strong technical depth in areas like IAM and SaaS security, and a proven ability to build automation and tooling.

What you'd actually do

  1. Define and build our Corporate Security capability within IT — establishing the operating model, executing the initial roadmap, and shaping the function as it grows over time.
  2. Own the centralized risk register and drive remediation across SaaS applications, integrations, endpoints, identity, and access paths.
  3. Secure our SaaS and integration landscape by auditing and governing OAuth applications, Slack integrations, and third-party connections, and by establishing authorization controls and ongoing review processes.
  4. Design and implement enforcement systems — automation and integrations that continuously enforce controls, detect and revoke unauthorized access, govern OAuth scopes, and monitor integration activity.
  5. Improve endpoint and user-level visibility, working with existing endpoint management tooling to manage risk from user-installed applications and browser extensions.

Skills

Required

  • corporate security
  • IT security
  • security engineering
  • identity and access management
  • SaaS security
  • endpoint management
  • DLP
  • network security
  • detection and response
  • building tooling and automation
  • coding
  • building integrations
  • implementing systems
  • working within or closely alongside IT organizations
  • defining and communicating risk

Nice to have

  • macOS-heavy environments managed through Jamf Pro or Fleet
  • OAuth governance
  • Slack integration management
  • SaaS security posture management (SSPM) tooling
  • Zero Trust architecture
  • DLP at a growth-stage company

What the JD emphasized

  • building programs or capabilities rather than operating within established ones
  • build tooling and automation that enforce controls, not just define them
  • written code, built integrations, or implemented systems that actively reduce risk in a production environment