Back to Jobs
TD

Cybersecurity Engineer – Volunteer Role

The Donovan's Venom

Remotefull time3 days ago
Apply Now

Cybersecurity Engineer

The Donovan’s Venom

Remote | Technology – Information Security | Volunteer

We’re Building — And It Must Be Secured by Design

The Donovan’s Venom is growing.

Systems.

Platforms.

Applications.

All of it must be secure from the ground up.

We are seeking a Cybersecurity Engineer to design, implement, and maintain the security controls that protect everything we build.

Because security isn’t just monitoring.

It’s how systems are built in the first place.

The Role

This role is responsible for the technical implementation of cybersecurity across systems, platforms, and applications.

You will design controls, secure configurations, and implement tools that reduce risk and strengthen our overall security posture.

You are not just responding to threats.

You are engineering systems to prevent them.

This role operates at the intersection of security, infrastructure, and application development, ensuring security is embedded across all technology.

What You’ll Own

Security Control Implementation
• * Design and implement security controls across:
• Systems and infrastructure
• Applications and platforms
• Ensure secure configurations and best practices

System Hardening & Configuration Security
• * Secure system configurations and reduce attack surfaces
• Enforce security baselines
• Validate systems against security standards

Threat Detection & Monitoring Support
• * Implement and support security monitoring tools
• Analyze logs and alerts for potential threats
• Support SOC and incident response efforts

Vulnerability Management & Remediation
• * Identify and assess system and application vulnerabilities
• Work with teams to prioritize and remediate risks
• Ensure timely resolution of security issues

Secure Development & Application Security
• * Integrate security into development processes
• Review code and system designs for vulnerabilities
• Support DevSecOps practices

Identity & Access Security
• * Support secure access controls:
• Role-based access
• Privileged access management
• Ensure systems enforce proper authentication and authorization

Security Tooling & Technology
• * Implement and manage security tools:
• Endpoint protection
• Monitoring tools
• Vulnerability scanners
• Evaluate and recommend new technologies

Incident Response Support
• * Assist in investigating and responding to incidents
• Identify root causes and support recovery efforts
• Contribute to post-incident improvements

Automation & Optimization
• * Build automation for:
• Monitoring
• Incident response
• Vulnerability management
• Improve efficiency and scalability of security operations

Continuous Improvement
• * Stay ahead of emerging threats and vulnerabilities
• Strengthen systems and processes continuously
• Promote adoption of security best practices

Who This Is For

This role is for someone who:
• * Thinks in systems, vulnerabilities, and prevention
• Enjoys building and securing technical environments
• Understands both infrastructure and application security
• Can collaborate with IT and development teams
• Wants to strengthen real-world security systems

Qualifications

Required
• * 2–4 years of experience in cybersecurity or system security roles
• Strong understanding of:
• Security principles
• System and network security
• Threat detection and mitigation

Preferred
• * Security certifications (Security+, CEH, CISSP – preferred)
• Experience with:
• Security tools and monitoring systems
• Vulnerability management
• Secure development practices
• Experience in cloud or SaaS environments
• Experience working in remote teams

Commitment
• * 8–12 hours per week
• Flexible schedule (with responsiveness to security needs)
• Fully remote

What You’ll Gain
• * Hands-on experience implementing security controls
• Exposure to real-world security engineering challenges
• Opportunity to work across systems, platforms, and applications
• Development in security tooling and best practices

Application Requirements (Read Carefully)

We are building — and securing in real time.

To ensure alignment:
• * You must be able to start within 14 days
• You must complete the full application
• You must be responsive to security needs

Important Disclaimer

This is a volunteer role.

We are onboarding individuals who are ready to contribute immediately.

Please only apply if you are prepared to begin within the next 14 days.

via JSearch
FREE WEEKLY NEWSLETTER

Stay on the Nerd Track

One email per week — courses, deep dives, tools, and AI experiments.

No spam. Unsubscribe anytime.