Staff Platform Security Engineer

Fivetran
Denver, Colorado, United States, AMERPosted 24 February 2026

Job Description

<div class="content-intro"><p>From Fivetran’s founding until now, our mission has remained the same: to make access to data as simple and reliable as electricity. With Fivetran, customer data arrives in their warehouses, canonical and ready to query, with no engineering or maintenance required. We’re proud that more organizations continue to leverage our technology every day to become truly data-driven.</p></div><p><span style="font-size: 10pt;"><strong>About the Role</strong></span></p> <p><span style="font-size: 10pt;">Fivetran is building data pipelines to power the modern data stack for thousands of companies.</span></p> <p><span style="font-size: 10pt;">We’re looking for<span style=" margin: 0px; padding: 0px;"> </span>a Staff Platform Security Engineer to enhance the security of our cloud-native and hybrid infrastructure. This individual contributor (IC) role is hands-on and execution-focused, requiring expertise in application security, cloud security, and DevSecOps. You will work closely with engineering teams to integrate security into the development lifecycle, automate security processes, and ensure resilience against emerging threats.</span></p> <p><span style="font-size: 10pt;">This is a full-time position based out of our Denver, CO office. Our hybrid work model offers a blend of remote flexibility and in-person collaboration, including two days in the office each week to connect and build as a team</span></p> <p><span style="font-size: 10pt;"><strong>What You’ll Do</strong></span></p> <ul> <li style="font-size: 10pt;"> <p><span style="font-size: 10pt;">Collaborate with engineering teams to integrate and manage security tooling within the SDLC, strategically automating security checks and feedback loops to enhance efficiency and security posture</span></p> </li> <li style="font-size: 10pt;"> <p><span style="font-size: 10pt;">Perform vulnerability scanning and participate in penetration testing exercises, automating scanning processes judiciously to identify common weaknesses, while reserving manual efforts for complex and nuanced assessments. Report findings and assist with remediation efforts.</span></p> </li> <li style="font-size: 10pt;"> <p><span style="font-size: 10pt;">Develop and maintain automation scripts and infrastructure-as-code for security checks related to machine configurations, container images, IAM policies, firewall rules, and cloud storage policies.</span></p> </li> <li style="font-size: 10pt;"> <p><span style="font-size: 10pt;">Implement and configure security controls within enterprise applications based on security best practices and architectural guidance.</span></p> </li> <li style="font-size: 10pt;"> <p><span style="font-size: 10pt;">Contribute to threat modeling efforts by providing technical insights and implementing identified security controls.</span></p> </li> <li style="font-size: 10pt;"> <p><span style="font-size: 10pt;">Work directly with engineering teams to troubleshoot and resolve security challenges across the stack while promoting a security-first mindset, identifying and automating recurring troubleshooting steps or remediation processes where it significantly improves response times and reduces manual intervention.</span></p> </li> <li style="font-size: 10pt;"> <p><span style="font-size: 10pt;">Implement and operationalize security solutions for cloud-native and hybrid infrastructure based on architectural guidelines.</span></p> </li> <li style="font-size: 10pt;"> <p><span style="font-size: 10pt;">Collaborate with infrastructure and cloud security teams to implement and maintain security controls across the entire technology stack, strategically prioritizing automation for consistent enforcement, monitoring, and alerting to improve overall security and reduce manual overhead.</span></p> </li> <li style="font-size: 10pt;"> <p><span style="font-size: 10pt;">Implement and manage security assessment tools, including vulnerability scanners, SIEM agents, DLP endpoints, and EDR se ... (truncated, view full listing at source)