Alpen Labs
Security Protocol Engineer
NEWRemoteFull-timeGlobal
š Seniorš Remote
RemoteRemote work position availableActivePosted within the last 30 days
Job Description
[AI-summarized by JobStash]
You will own security for protocol-layer components including L2, bridges and custody systems. You will act as the final gatekeeper before code hits main, lead threat modeling, design reviews and mitigation planning, write critical patches and drive hardening, and maintain security CI tooling (sig-verification, SAST, fuzzing, secrets scanning). You will review all protocol-relevant pull requests, run secure coding workshops and pair-program during critical sprints, interface with auditors and bounty researchers to scope, triage and fix issues, and block merges or deploys on security grounds when necessary, using direct commit access for emergency fixes.
Requirements
- ā5+ years in security engineering with hands-on software experience
- āStrong background in Rust, Go, or Solidity
- āDeep knowledge of threat modeling and real-world exploit paths
- āExperience owning or maintaining CI-based security automation
- āComfortable leading security without direct organizational ownership
- āProtocol-level blockchain experience (bonus)
- āAudit, bounty, or custody systems experience (bonus)
Responsibilities
- āOwn security across protocol-layer components (L2, bridge, custody)
- āAct as the final gatekeeper before code hits main
- āLead threat modeling, design reviews, and mitigation planning
- āWrite critical patches and drive hardening when bandwidth is limited
- āMaintain security CI tooling including sig-verification, SAST, fuzzing, and secrets scanning
- āReview 100% of protocol-relevant PRs and enforce automated checks
- āRun secure coding workshops and pair-program during critical sprints
- āInterface with auditors and bounty researchers to scope, triage, and fix issues
- āBlock merges or deploys on security grounds
- āUse direct commit access for emergency fixes
Benefits & Perks
- āFully remote work
- āFlexible working hours across time zones
Tech Stack
Secret scanningSASTthreat modelingcustodyprotocolauditGobridgemitigation planningLayer 2