Cybersecurity Engineer – Volunteer Role
The Donovan's Venom
Cybersecurity Engineer
The Donovan’s Venom
Remote | Technology – Information Security | Volunteer
We’re Building — And It Must Be Secured by Design
The Donovan’s Venom is growing.
Systems.
Platforms.
Applications.
All of it must be secure from the ground up.
We are seeking a Cybersecurity Engineer to design, implement, and maintain the security controls that protect everything we build.
Because security isn’t just monitoring.
It’s how systems are built in the first place.
The Role
This role is responsible for the technical implementation of cybersecurity across systems, platforms, and applications.
You will design controls, secure configurations, and implement tools that reduce risk and strengthen our overall security posture.
You are not just responding to threats.
You are engineering systems to prevent them.
This role operates at the intersection of security, infrastructure, and application development, ensuring security is embedded across all technology.
What You’ll Own
Security Control Implementation
• * Design and implement security controls across:
• Systems and infrastructure
• Applications and platforms
• Ensure secure configurations and best practices
System Hardening & Configuration Security
• * Secure system configurations and reduce attack surfaces
• Enforce security baselines
• Validate systems against security standards
Threat Detection & Monitoring Support
• * Implement and support security monitoring tools
• Analyze logs and alerts for potential threats
• Support SOC and incident response efforts
Vulnerability Management & Remediation
• * Identify and assess system and application vulnerabilities
• Work with teams to prioritize and remediate risks
• Ensure timely resolution of security issues
Secure Development & Application Security
• * Integrate security into development processes
• Review code and system designs for vulnerabilities
• Support DevSecOps practices
Identity & Access Security
• * Support secure access controls:
• Role-based access
• Privileged access management
• Ensure systems enforce proper authentication and authorization
Security Tooling & Technology
• * Implement and manage security tools:
• Endpoint protection
• Monitoring tools
• Vulnerability scanners
• Evaluate and recommend new technologies
Incident Response Support
• * Assist in investigating and responding to incidents
• Identify root causes and support recovery efforts
• Contribute to post-incident improvements
Automation & Optimization
• * Build automation for:
• Monitoring
• Incident response
• Vulnerability management
• Improve efficiency and scalability of security operations
Continuous Improvement
• * Stay ahead of emerging threats and vulnerabilities
• Strengthen systems and processes continuously
• Promote adoption of security best practices
Who This Is For
This role is for someone who:
• * Thinks in systems, vulnerabilities, and prevention
• Enjoys building and securing technical environments
• Understands both infrastructure and application security
• Can collaborate with IT and development teams
• Wants to strengthen real-world security systems
Qualifications
Required
• * 2–4 years of experience in cybersecurity or system security roles
• Strong understanding of:
• Security principles
• System and network security
• Threat detection and mitigation
Preferred
• * Security certifications (Security+, CEH, CISSP – preferred)
• Experience with:
• Security tools and monitoring systems
• Vulnerability management
• Secure development practices
• Experience in cloud or SaaS environments
• Experience working in remote teams
Commitment
• * 8–12 hours per week
• Flexible schedule (with responsiveness to security needs)
• Fully remote
What You’ll Gain
• * Hands-on experience implementing security controls
• Exposure to real-world security engineering challenges
• Opportunity to work across systems, platforms, and applications
• Development in security tooling and best practices
Application Requirements (Read Carefully)
We are building — and securing in real time.
To ensure alignment:
• * You must be able to start within 14 days
• You must complete the full application
• You must be responsive to security needs
Important Disclaimer
This is a volunteer role.
We are onboarding individuals who are ready to contribute immediately.
Please only apply if you are prepared to begin within the next 14 days.