About Us:
At Blooming Health, our mission is to power healthy aging-in-place for all. Our next generation engagement platform seamlessly connects older adults and caregivers with service providers in the $575B aging-in-place market. We are empowering older adults to live in their community independently and help aging-in-place service providers to serve more older adults. We are a fast growing company looking for a mission-driven team player to drive our upcoming growth plans in multiple states.
Overview:
We are seeking a Senior IT & Security Engineer to build and optimize our security monitoring and incident response infrastructure from the ground up. In this role, you will deploy and configure SIEM/SOAR solutions, establish and refine ITSM processes (Incident, Change, Configuration Management), and oversee a robust vulnerability management program. You will also monitor the system for threats, conduct remediations and manage IT/security evidence collection for audits, collaborate closely with Blooming Health’s IT manager and external consultants, and lead technical security training as needed. In addition, you will help manage our IT infrastructure and systems including provisioning, setup etc.. The ideal candidate has a solid background in security and IT operations, thrives on creating systems from scratch, and excels at cross-functional collaboration.
Key Responsibilities
1. Plan and Implement SIEM/SOAR Solutions
- Evaluate, deploy, and configure SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) platforms from initial planning to production rollout.
- Develop correlation rules, dashboards, and automated playbooks to detect threats, reduce response times, and improve detection accuracy.
- Continuously fine-tune SIEM/SOAR settings for high-fidelity alerts, minimizing false positives in line with business risk profiles.
2. Establish and Refine ITSM Processes
- Design and implement Incident, Change, and Configuration Management workflows aligned with industry best practices.
- Integrate ITSM processes with security tools, ensuring seamless ticket creation, escalation, and remediation tracking.
- Create and maintain documentation, runbooks, and standard operating procedures for ITSM-related tasks.
3. Vulnerability Management Program
- Plan and configure vulnerability management tools, oversee regular scanning, and ensure comprehensive coverage of network assets and applications.
- Prioritize remediation efforts based on risk, coordinate with system owners, and track vulnerability closure.
- Generate periodic reports and metrics for leadership, highlighting trends and outstanding issues.
4. Audit Evidence Collection and Coordination
- Collect and organize IT/security-related evidence and artifacts required for internal and external audits.
- Maintain detailed records of security controls, incident response actions, and system configurations for regulatory compliance.
5. Collaboration and Stakeholder Management
- Liaise closely with Blooming Health’s IT manager and external security consultants to align security initiatives with organizational goals.
- Coordinate with infrastructure, DevOps, and application teams to ensure seamless integration of security solutions and processes.
- Communicate security risks, recommendations, and best practices to both technical and non-technical audiences.
6. Tool Configuration and Integration
- Lead end-to-end configuration of security tools (SIEM/SOAR, scanning platforms, ITSM solutions) to ensure compatibility and centralized visibility.
- Develop scripts or automation workflows (Python, PowerShell, etc.) to automate repetitive tasks and streamline operations.
7. Incident Response and Coordination
- Oversee the full lifecycle of security incidents, from initial detection to containment, eradication, and recovery.
- Collaborate with cross-functional teams during major incidents, documenting lessons learned and implementing process improvements.
- Ensure compliance with relevant regulations (HIPAA, NIST, ISO, etc.) in incident handling and reporting.
8. Technical Security Training
- Lead technical security training efforts, sharing best practices for system hardening, secure coding, and incident handling.
- Mentor junior team members and ensure continuous learning and improvement within the security team.
9. Continuous Improvement and Strategy
- Stay current with emerging threats, vulnerabilities, and industry trends to evolve security measures proactively.
- Propose enhancements to the security architecture and advocate for new technologies to keep the environment resilient.
- Provide technical guidance and coaching to junior staff, promoting a culture of knowledge sharing.
Qualifications
Experience:
- Strong background in configuring and managing SIEM/SOAR platforms (e.g., Splunk, QRadar, Sentinel, Cortex XSOAR) from scratch.
- Proven record establishing ITSM processes (Incident, Change, Configuration Management) in a mid-to-large enterprise environment.
- Hands-on experience setting up vulnerability management solutions (e.g., Nessus, Qualys) and coordinating remediation efforts.
- Familiarity with collecting and organizing audit artifacts and evidence for compliance assessments.
Technical Skills:
- Comfortable with scripting/automation (Python, PowerShell, Bash) to integrate disparate systems and automate workflows.
- Familiarity with containerization, cloud platforms (AWS, Azure, GCP), and DevOps practices is a plus.
- Knowledge of security frameworks and compliance requirements (NIST SP 800-53, HIPAA, ISO 27001, etc.).
Soft Skills:
- Excellent communication and interpersonal skills, capable of bridging technical details with non-technical stakeholders.
- Ability to self-direct, prioritize multiple work streams, and adapt to a fast-paced environment.
- Strong analytical mind, problem-solving orientation, and a passion for continually improving security processes.
Education/Certifications:
- Bachelor’s degree in Computer Science, Information Security, or related field; or equivalent work experience.
- Relevant security certifications (CISSP, CISM, GIAC) are advantageous.
Join Our Team
If you’re ready to build and refine security capabilities from the ground up—deploying SIEM/SOAR, establishing ITSM workflows, managing vulnerabilities, collecting audit evidence, and leading technical security training—we’d love to hear from you. Apply now and help us create a cutting-edge security environment that protects our mission-critical assets at Blooming Health.