Lead Security Analyst
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Information Security
Hacker Rank helps thousands of companies like OpenAI, NVIDIA,Mercedes and Amazon hire developers based on their skills vs. pedigree, and also nurtures a community of millions of developers to upskill themselves to become next-gen developers.
The people at Hacker Rank care deeply about their work and have an extremely intense work ethic. In many companies, speed & quality is a tradeoff. At Hacker Rank, it’s not -- we expect you to ship in about half the time that most competent people think is possible while maintaining a standard of quality you’d proudly sign your name on.
The only way to make this happen is if you truly love your craft and are deeply committed to growth.
This person is vital in ensuring Hacker Rank’s security and building customer trust. As the first point of contact for IT security inquiries, this role ensures customers feel confident sharing their data by providing clear, timely responses.
Responsibilities include completing security questionnaires, addressing follow-up questions, and working closely with Go-To-Market (GTM) teams to support customer and prospect security concerns. This role directly supports Hacker Rank’s success by strengthening security and customer confidence by managing security operations, maintaining compliance, and ensuring transparent communication.
Creating a security roadmap and working with product, engineering, and IT teams to improve our security posture.
What you'll do: Security Operations & Monitoring- Continuously monitor security tools and logs to identify potential threats.
- Investigate alerts and coordinate with engineering or Dev Ops teams for incident response.
- Serve as the first point of contact for responding to security-related customer queries or tickets (e.g., data handling, compliance, vulnerabilities).
- Participate in security review calls with customers and prospects to provide reassurance about Hacker Rank’s security posture.
- Fill out IT security questionnaires from customers in a timely and accurate manner.
- Be available to answer customer follow-ups regarding security concerns.
- Draft and update the security policies (e.g., password management, BYOD, vendor risk assessments).
- Help maintain compliance with security standards (e.g., ISO 27001, SOC 2, GDPR) and gather necessary evidence during audits.
- Conduct or coordinate vulnerability scans and penetration testing.
- Work closely with product teams to ensure timely patching and remediation of critical vulnerabilities.
- Conduct training sessions and internal communications to educate staff on phishing, social engineering, and other security best practices.
- Act as the first line of investigation for potential security incidents across the company.
- Escalate complex or severe security issues to the CTO/CISO as needed.
- Enjoy communicating clearly and confidently to build trust with customers and stakeholders.
- Seek opportunities to plan, automate and streamline processes for greater efficiency.
- Collaborate naturally with cross-functional teams and find energy in aligning security with business goals.
- Can strengthen security while maintaining business agility and ensuring product development stays on track.
- Have strong written and verbal communication skills, with the ability to clearly explain technical concepts to both technical and non-technical team members.
- 5+ years of experience in information security, risk management, or security operations, with a focus on customer-facing security support.
- Strong communication skills to engage confidently with customers, address security concerns, and build trust.
- Hands-on experience with security frameworks such as ISO 27001, SOC 2, GDPR, and NIST compliance.
- Proficiency in security operations including monitoring, incident response, and vulnerability management.
- Ability to balance security and business needs, ensuring protection without slowing down product development or operations.
- Experience in automation and process improvement to streamline security…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).