Machinify is a leading healthcare intelligence company with expertise across the payment continuum, delivering unmatched value, transparency, and efficiency to health plan clients across the country. Deployed by over 85 health plans, including many of the top 20, and representing more than 270 million lives, Machinify brings together a fully configurable and content-rich, AI-powered platform along with best-in-class expertise. We’re constantly reimagining what’s possible in our industry, creating disruptively simple, powerfully clear ways to maximize financial outcomes and drive down healthcare costs.
About the Opportunity:
At Machinify, we’re building a robust security program to protect our clients’ sensitive healthcare data and maintain the highest standards of information security. As part of the Security Engineering team, you will help operationalize threat management and vulnerability management across Machinify’s cloud and on-premises environments. This role is central to our security operations capability as we integrate four distinct technology platforms and establish a unified security posture across the organization.
As a Security Engineer focused on Threat & Vulnerability Management, you will split your time between vulnerability lifecycle management and supporting the SOC through alert management, SOAR automation, and detection use case development. This is a hands-on engineering role designed for someone with a solid general security foundation who is ready to develop deeper technical skills across both threat and vulnerability disciplines. Prior experience in a SOC or security analyst role is a strong fit for this position.
What you’ll do:
Vulnerability Management (50% of role):
- Run and maintain vulnerability scans across cloud and on-premises environments using enterprise scanning tools
- Track vulnerabilities through the remediation lifecycle: triage, assignment, follow-up, and closure verification
- Help coordinate penetration testing engagements, including scheduling, scoping support, and tracking findings to remediation
- Assist with attack surface management activities including asset inventory maintenance and external exposure monitoring
- Produce vulnerability reports and metrics for security leadership and engineering stakeholders
- Work with infrastructure and cloud engineering teams to communicate and prioritize remediation
- Maintain documentation for exceptions, risk acceptances, and remediation SLA tracking
Threat Management & SOC Engineering (50% of role):
- Manage and triage CrowdStrike Falcon alerts, driving escalation and response coordination with the SOC
- Support and improve Red Canary SOAR automations, including updating playbooks and alert enrichment workflows
- Develop and tune detection use cases to improve alert fidelity and reduce false positives
- Document runbooks and escalation procedures for detections managed through this role
- Collaborate with SOC analysts to identify detection gaps and translate feedback into platform improvements
- Support threat hunting activities and security incident response as needed
- Help evaluate and onboard new log sources and detection data feeds to expand SOC coverage
What experience you bring (Role Requirements):
Essential Qualifications:
- Bachelor’s degree in Computer Science, Information Security, or related field, or equivalent work experience
- 3+ years of experience in information security in a hands-on role such as SOC analyst, security analyst, or similar
- Familiarity with EDR or endpoint security platforms; experience with CrowdStrike Falcon is a plus but not required
- Exposure to vulnerability scanning concepts and tools, even if not as a primary job function
- Basic understanding of SOAR or security automation concepts; direct platform experience is a plus but not required
- Working knowledge of common attack techniques, the MITRE ATT&CK framework, and alert triage decision-making
- Foundational understanding of cloud environments (AWS or Azure), networking, and operating systems
- Scripting or development aptitude (Python, Bash, or PowerShell) sufficient to support automation and workflow tasks
- Strong analytical and problem-solving skills with the ability to communicate findings clearly across technical and non-technical audiences
Preferred Qualifications:
- Security certifications such as CompTIA Security+, CySA+, or equivalent
- Experience with a SOAR platform in any capacity, including alert workflow design or playbook development
- Hands-on experience with enterprise vulnerability scanners (Tenable, Qualys, Rapid7, or similar)
- Familiarity with SIEM platforms and basic query writing for alert investigation
- Knowledge of healthcare compliance requirements (HIPAA, HITRUST)
- Experience working across multiple environments or teams in a complex organization
What We Offer:
- Work from anywhere in the US! Machinify is digital-first.
- Top Medical/Dental/Vision offerings
- FSA/HSA
- Tuition reimbursement
- Competitive salary, 401(k) with company match
- Additional health and wellness benefits and perks
- Flexible and trusting environment where you’ll feel empowered to do your best work