About the job
About Twenty
At Twenty, we're tackling one of the most pressing challenges of our time: safeguarding democracies in the digital era. We create innovative technologies that function at the crossroads of the cyber and electromagnetic domains, where operational speed surpasses human perception and complexity defies traditional limits. Our team doesn't merely address issues – we achieve transformative results that have a direct effect on national security. We are pragmatic optimists who recognize that while our mission to protect America and its allies is demanding, success is within reach.
Position Overview
In this role, you will take charge of developing and maintaining the security infrastructure that ensures the safety of Twenty's engineering systems without hindering engineering productivity. Your responsibilities will encompass runtime security, access control, secrets management, compliance, and CI/CD hardening, with a focus on making security the easiest route to take. You will partner closely with our engineering teams to design secure-by-default architectures and create the tools and automation that empower developers to operate swiftly without compromising security. You will report to the VP of Engineering and work collaboratively across our product teams.
Ideal Candidate
You view security as an enabler for engineering, not an obstacle.
You take full responsibility from identifying risks to designing controls and implementing solutions.
You apply sound judgment to decision-making, knowing when to enforce strict controls and when flexibility is necessary to encourage adoption.
You communicate effectively with both technical and non-technical stakeholders, translating risk into understandable terms.
You prefer automation over policy; if a manual step is required for security, you see it as a flaw.
You maintain high standards for reliability and auditability in the systems you create.
You are self-motivated and excel in a dynamic environment where you are defining the function.
Your Responsibilities
Manage runtime security and vulnerability assessment across cloud and container environments, including triage, prioritization, and remediation tracking.
Design and implement identity and access management (IAM) strategies across AWS and internal systems, ensuring least-privilege access by default.
Oversee secrets and credentials management, including policies, tooling, rotation, and developer workflows that facilitate secure practices.
