Later Logo

Senior Security Engineer & Identity Engineer

💰 $145k-$175k

Job Description

Later is the world’s most intelligent influencer marketing company, built to give brands the confidence to create unforgettable campaigns. By combining real creator relationships, trusted intelligence, and expert guidance, Later removes fear and guesswork from one of marketing’s most visible investments.

Built on a native, AI-powered platform and more than a decade of proprietary data—including billions of social interactions, impressions, and $2.4B+ in verified influencer-driven purchases—Later helps teams understand what will work before they launch.

By combining trusted insight with expert guidance, Later removes guesswork from influencer marketing, enabling brands to choose the right creators, execute fully managed campaigns, and drive meaningful growth across awareness, engagement, and revenue. Trusted by leading enterprise brands including Nike, Wayfair, Unilever, and Southwest Airlines, Later bridges creativity and performance so campaigns don’t just look good—they deliver results. Learn more at later.com.

About this position:

As a Senior Security Engineer at Later, you will play a critical role in strengthening and scaling the security foundations that power our platform. This role blends deep security expertise with hands-on engineering, with a particular focus on identity and access management, authentication systems, and secure-by-design development practices.

You’ll partner closely with Engineering, Infrastructure, and Product teams to embed security into our CI/CD pipelines, internal platforms, and customer-facing systems—enabling teams to move quickly while keeping our systems, data, and users safe. This is a high-impact individual contributor role for someone who thinks like a defender, builds like a software engineer, and leads through influence.

What you’ll be doing:

Strategy

  • Assess and continuously improve Later’s security posture across applications, infrastructure, and development workflows
  • Define and implement scalable security standards, guardrails, and best practices that support compliance through automated and auditable solutions
  • Partner with Engineering and Product leadership to align security priorities with business objectives and delivery timelines
  • emerging risks and proactively design systems and processes that reduce long-term exposure

Technical/ Execution

  • Own identity and access management across Later’s platform, including authentication, authorization, and secure machine-to-machine (M2M) processes
  • Design, implement, and maintain secure authentication systems for both internal tools and customer-facing experiences
  • Harden login systems, establish consistent authentication patterns across services, and ensure secure integration between tools
  • Build and maintain internal security tooling to support secure development, operational visibility, and compliance workflows
  • Embed security controls into CI/CD pipelines, including SAST, DAST, SCA, container scanning, secret management, and secure build/deploy practices
  • Partner with engineering teams to identify vulnerabilities, clearly communicate risk and impact, and drive effective remediation

Team / Collaboration

  • Provide pragmatic, solution-oriented security guidance during system design and architecture reviews
  • Collaborate cross-functionally to embed security into development workflows without slowing delivery
  • Translate complex security concepts into clear, actionable recommendations for both technical and non-technical stakeholders
  • Act as a trusted partner to engineering teams, balancing risk mitigation with business enablement

Leadership

  • Lead by influence—raising the security bar through standards, tooling, and mentorship
  • Set a high standard for secure engineering practices and help others level up their security mindset
  • Model accountability, ownership, and transparency in security decisions

Research/Best Practices

  • Stay current on application security, cloud security, and identity best practices
  • Apply industry frameworks (e.g., OWASP, NIST, CIS Controls) pragmatically within production environments
  • Continuously evaluate and improve identity architecture and security automation to scale with the business

Nice to have:

  • Experience designing or migrating identity architecture at scale
  • Experience building internal developer security tooling
  • Experience working in a high-growth technology environment

What success looks like:

  • Identity and access management is secure, scalable, and consistently implemented across the platform
  • Security controls are embedded into CI/CD pipelines, reducing manual effort and improving detection and prevention
  • Engineering teams proactively consider security in their designs and view security as an enabler—not a blocker
  • Vulnerabilities are identified early, clearly prioritized, and remediated efficiently
  • Compliance frameworks (e.g., SOC 2, ISO 27001) are supported through automation and well-defined processes
  • Later’s overall security posture measurably improves while maintaining speed of product delivery

What you bring:

  • 5–7+ years of experience as a Security Engineer or Software Engineer with a strong security focus
  • Proven experience building and operating production-grade software, systems, or internal tooling
  • Strong background in application security, infrastructure security, and secure CI/CD practices
  • Hands-on experience with identity and access management, including authentication systems, authorization frameworks, and machine-to-machine security patterns
  • Experience applying security frameworks such as OWASP, NIST, or CIS Controls in real-world production environments
  • Familiarity with cloud security tooling (AWS Security Hub, Azure Security Center, or GCP Security Command Center), SIEM/SOAR tools, and Infrastructure-as-Code security scanning (Terraform, CloudFormation)
  • Experience supporting compliance frameworks such as SOC 2 and ISO 27001
  • Familiarity with modern backend systems (including C#) and cloud-native architectures
  • Demonstrated ability to collaborate cross-functionally and influence engineering teams to improve security outcomes
  • Strong communication skills with the ability to translate complex security concepts into clear, actionable guidance

How you work:

  • Driven by Impact: You deliver results that matter—prioritizing high-value work, meeting deadlines, and adapting quickly while keeping outcomes clear.
  • Strategic & Customer-Centric: You anticipate risks and opportunities, connect decisions to long-term growth, and build trust through proactive insights.
  • Curious & Growth-Oriented: You seek knowledge, ask sharp questions, and apply learnings fast—challenging the status quo with a mindset of improvement.
  • Collaborative & Resilient: You thrive in change by staying resourceful, solution-focused, and positive—removing roadblocks, sharing insights, and keeping morale high.
  • Accountable & Honest: You own your work, hold yourself and others to a high bar, and use transparent feedback to drive growth.
  • Emotionally Intelligent: You build trust through empathy and collaboration, foster inclusion, and inspire others with grit, optimism, and integrity.

Our approach to compensation:

We take a market-based & data-driven approach to compensation. We leverage data from trusted third-party compensation sources to help us understand the market value of a role based on function, level, geographic location, and scope. We evaluate compensation bi-annually, including performance and market-related factors.

Our salaries are benchmarked against market Total Cash Compensation for the geographic location of our job posting. Compensation for some roles is structured as On Target Earnings (OTE = base + commission/variable) while for others it is structured as Salary only.

To comply with local legislation and ensure transparency, we share salary ranges on all job postings. Skills, experience and other factors help determine the final salary we offer which may vary from the original range posted.

Additionally, all permanent team members are eligible to participate in various benefits plans as part of their overall compensation package.

Salary Range:

$ 145,000 - 175,000

#LI-Remote

Where we work:

We have offices in Boston, MA; Vancouver, BC; Chicago, IL; and Vancouver, WA. For select positions, we are open to hiring fully remote candidates. We post our positions in the location(s) where we are open to having the successful candidate be located.

Diversity, inclusion, and accessibility:

At Later, we are committed to fostering a culture rooted in an inclusion-first mindset at every level of the company, embracing the importance of hiring and building teams for culture add rather than culture fit. We openly build and maintain unbiased hiring, pay, and promotion practices to create a foundation for an equitable workplace, paving the way for systemic change.

We are committed to creating a diverse environment and are proud to be an equal opportunity employer. All applications will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, national origin, disability, or age. Please let us know if you require any accommodations or support during the recruitment process.

Share this job:
Please let Later know you found this job on Remote First Jobs 🙏

3638 similar remote jobs

Explore latest remote opportunities and join a team that values work flexibility.

Remote companies like Later

Find your next opportunity with companies that specialize in Social Media Management, Social Media Marketing, Instagram, and Tech. Explore remote-first companies like Later that prioritize flexible work and home-office freedom.

Whalar Logo

Whalar

A Creator and social agency specializing in Creator-led marketing, advertising, and content creation.

View company profile →
Collectively Logo

Collectively

A global social influence company providing influencer marketing programs and tools to brands.

View company profile →
Only One Logo

Only One

11-50 only.one

Runs campaigns to shape global ocean and climate policy.

View company profile →
PRecious Communications Logo

PRecious Communications

Communications Consultancy

View company profile →
Prosek Partners Logo

Prosek Partners

An integrated communications and marketing firm specializing in financial and professional services.

View company profile →
Power Digital Marketing Logo

Power Digital Marketing

Tech-enabled growth marketing firm offering consultative marketing, analytics, and technology.

View company profile →

Project: Career Search

Rev. 2026.3

[ Remote Jobs ]
Direct Access

We source jobs directly from 21,000+ company career pages. No intermediaries.

01

Discover Hidden Jobs

Unique jobs you won't find on other job boards.

02

Advanced Filters

Filter by category, benefits, seniority, and more.

03

Priority Job Alerts

Get timely alerts for new job openings every day.

04

Manage Your Job Hunt

Save jobs you like and keep a simple list of your applications.

21,000+ SOURCES UPDATED 24/7
Apply