Security Engineer; Blue Team
Listed on 2025-12-21
-
IT/Tech
Cybersecurity, Security Manager, IT Consultant, IT Project Manager
Olo is a leading SaaS platform accelerating digital transformation in the restaurant industry, by helping customers deliver more personalized and profitable guest experiences. As a result, our digital ordering, payment, and guest engagement solutions enable brands to do more with less and make every guest feel like a regular.
Reporting to the Security Engineering Director, the Staff Security Engineer will act as technical lead of the Olo Security Blue Team and work on security defences that allow our systems to keep running while protecting the data of our clients and their customers.
Additionally, you will help in the identification and prioritization of future project initiatives based on risk and execute on cross‑functional projects with a high degree of ownership and excellence, all while actively mentoring other team members and elevating the collective team’s capabilities and skill sets. If you are passionate about reducing risk while supporting innovation we encourage you to apply!
You can work remotely from anywhere in the U.S. or at Olo's headquarters in NYC. What You'll Do- Guide and coach Olo’s Blue Team on Information Protection, Incident Detection and Response and Service Delivery.
- You will provide strategic and technical oversight to the team and the program.
- Technically lead a team of security engineers and analysts who hunt, detect, and respond to internal and external threats.
- Collaborate with customers and partners to strengthen their security posture.
- Drive ongoing optimizations by implementing new technologies, replacing technologies, addressing evolving threats, scaling practices and automating security activities.
- Ultimately you will keep team member and customers data safe by identifying and mitigating vulnerabilities and risks by providing actionable guidance to product teams.
- Lead Olo’s Information Protection program including the selection, testing, implementation and maintenance of security tools and services, security awareness, service provider management and the ongoing testing of those controls.
- Oversee Vulnerability Management program including vulnerability assessments, risk scoring and vulnerability resolution.
- Oversee Threat Hunting program to detect and mitigate advanced threats.
- Manage non-event driven security reviews, including concept reviews, design reviews, patching, firewall rules and system configuration checks.
- Apply Web application and API security principles and techniques, such as zero trust, RBAC, authentication, authorization, auditing, rate limiting, challenges, etc., to protect our cloud-based services from unauthorized access and abuse.
- Oversee Incident Detection and Response program including ownership of incident response processes, tools and services and the ongoing continuous improvement of those controls.
- Coordinate the detection and response to attacks through all incident phases.
- Ensure incident reports are accurate, detailed and relevant.
- Monitor, detect, and remediate misconfigurations and security risks across our cloud environments.
- Participate in a 24/7 on‑call rotation.
- Oversee Security Services program including security support requests, risk assessments, vendor assessments, PCI and SOC audit support and service provider management.
- 5+ years of Security Engineering, Security Operations or Security Architecture experience.
- CISSP, GCIH or similar certification preferred.
- Experience acting as technical lead to distributed teams consisting largely of remote engineers.
- Experience complying with PCI‑DSS and other compliance and regulatory standards.
- Experience with attacker tactics, techniques and procedures.
- Knowledge of information technology, evolving threats, attack patterns, incident response and cyber security standards.
- Experience developing and leading incident response, remediation and mitigation activities, and providing status updates and reports.
- Experience analyzing security events to discern events that qualify as a legitimate security incident as opposed to non‑incidents (ie. incident investigation, implementing countermeasures, and conducting…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).