National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Security Engineer - Automation

MoonPay
London
3 days ago
Create job alert

About MoonPay


Hi, we’re MoonPay. We’re here to onboard the world to Web3.


Why?Because we think Web3 is a unique and democratising technology. It gives people back control of their money, digital identity, data, and property like nothing else before it.


What We Do


We’re the leading infrastructure company in Web3. This means we offer our partners everything from payment solutions (we call them 'Ramps') to minting software for digital collectibles, like NFTs. And over30 millionpeople around the world now trust our products — just take a look on Trustpilot.


We’re also big on collaborations. And we've worked on stunts, drops, and partnerships with some of the world's most prestigious and forward-thinking brands.


But that’s not all. We have also built our own consumer app because we wanted to see if we could build a better Web3 account. It’s taken off in a big way, and we're working hard to continually improve it and to strive for perfection.


So whatever your background, we’re sure there’s something for you here.


Come help us build the future of Web3 and digital ownership.


About the Opportunity

Our Product Security Squad is a dynamic blend of proactive defenders and inquisitive problem-solvers. We're dedicated to fortifying our systems through rigorous security reviews, hands-on penetration testing, and proactive threat modelling. We actively manage our Bug Bounty program, ensuring swift response and remediation, and leverage cutting-edge tools like Cloudflare's WAF to build robust defenses. We offer an extensive number of security services to our Engineering teams including cloud security, tailored security advice, threat modelling and penetration testing. Collaboration is key, as we embed security best practices throughout the SDLC. Crucially, we are expanding our capabilities in security automation and vulnerability management, integrating tooling directly into development workflows and driving efficient vulnerability resolution across the organization. We are constantly researching emerging threats, crafting effective mitigation strategies, empowering our engineering teams with comprehensive training, maintaining up-to-date security standards, and leading incident response with precision. We are passionate about fostering a secure environment and contributing to the wider security community.


What you will do


  • Design, implement, and manage the integration of security tooling (SAST, DAST, SCA, Secrets Scanning) into our CI/CD pipelines
  • Develop and maintain automation scripts and platforms to streamline security processes and workflows
  • Own and operate the end-to-end vulnerability management lifecycle: identification, triage, prioritization, distribution, tracking, and reporting
  • Collaborate closely with engineering teams to ensure timely remediation of identified vulnerabilities and provide guidance on secure coding practices
  • Drive the adoption and implementation of the SLSA framework to enhance supply chain security
  • Continuously evaluate and improve existing security automation and vulnerability management workflows, bringing innovation and ownership to the process
  • Research emerging threats and vulnerabilities, particularly those relevant to our tech stack and development practices, translating findings into actionable detection or prevention mechanisms
  • Develop and maintain documentation for security automation tools, processes, and vulnerability management procedures
  • Assist in triaging and validating findings from various sources, including automated scanners, penetration tests, and bug bounty programs
  • Contribute to security training materials focused on secure development practices and the tools you implement
  • Support incident response activities, particularly where automation or vulnerability data can aid investigation and remediation


What you'll be working on

As a key member of our Product Security squad specifically in the Automation and Vulnerability Management Team, you will focus on embedding security seamlessly into our Software Development Lifecycle (SDLC). You'll be hands-on in building, integrating, and optimizing security automation pipelines, incorporating tools for static analysis (SAST), dynamic analysis (DAST), software composition analysis (SCA), and secrets detection directly into our CI/CD processes. You will champion and manage our vulnerability management program, ensuring vulnerabilities are identified, prioritized, tracked, and remediated efficiently. You'll drive improvements in our supply chain security through initiatives like the SLSA framework. Collaborating closely with engineering teams, you'll automate security workflows, enhance our security posture through innovation, and play a vital role in protecting MoonPay's infrastructure and applications.


About You


  • You have a solid background in software development with demonstrable experience, ideally using languages common in backend or infrastructure development (e.g., Go, Python, Node.js)
  • You possess a strong passion for cybersecurity and have transitioned or are keen to focus your career on security automation and vulnerability management
  • You have understanding on security tools like SAST, DAST, SCA, and secrets scanning solutions within a CI/CD environment (here at MoonPay we use Github)
  • You understand the principles of vulnerability management, including prioritization frameworks (e.g., CVSS) and remediation tracking
  • You are familiar with the concepts and goals of the SLSA framework or similar supply chain security initiatives
  • You excel at collaborating with technical teams, explaining security concepts and tooling requirements clearly, and driving adoption of new processes
  • You possess strong analytical and problem-solving skills, with an ability to identify inefficiencies and propose automated solutions
  • You are self-motivated, innovative, take ownership of your work, and can operate effectively in a remote, fast-paced environment
  • You will collaborate closely with Application Security and Cloud Security teams to translate their operational needs into actionable automation requirements, taking ownership of implementing related security initiatives
  • Experience working in disruptive technology, FinTech, SaaS, or Crypto sectors is a plus
  • Familiarity with cloud security principles (AWS, GCP) is beneficial


Most importantly, though, you will embody the core principles that everyone here at the MoonPay lives by. Our“BLOCK Values”are at the heart of everything we do - and they are…



  • B- Be Hungry
  • L- Level Up
  • O- Own It
  • C- Crypto Curious
  • K- Kaizen


MoonPay Perks



  • Equity package
  • Unlimited holidays
  • Paid parental leave
  • Annual training budget
  • Home office setup allowance
  • Monthly budget to spend on our products
  • Working in a disruptive and fast-growing industry where the possibilities are endless
  • Freedom, autonomy and responsibility


Research has shown that women are less likely than men to apply for this role if they do not have experience in 100% of these areas. Please know that this list is indicative, and that we would still love to hear from you even if you feel that you are only a 75% match. Skills can be learnt, diversity cannot.


Please let us know if you require any accommodations for the interview process, and we’ll do our best to provide assistance.


Commitment To Diversity


At MoonPay we believe that every voice matters. We strive to create a mindful and respectful environment where everyone can bring their authentic self to work, and experience a culture that is free of harassment, racism, and discrimination. That’s why we are committed to diversity and inclusion in the workplace and are a proud equal opportunity employer. We prohibit discrimination and harassment of any kind based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veteran status or any other characteristic protected by law. This policy applies to all employment practices within our organization, including, but not limited to, hiring, recruiting, promotion, termination, layoff, and leave of absence.


MoonPay is also committed to providing reasonable accommodations in our job application procedures for qualified individuals with disabilities. Please inform our Talent Team if you need any assistance completing any forms or to otherwise participate in the application process.


Please be aware that MoonPay does not request an AI-led interview without seeing a recruiter or team member from MoonPay on video call. We won't ask for your personal identification documents or any money from you during your interview process with us. Be fraud smart! If you receive an email - claiming to be from MoonPay - but from an email address ending in anything other than @moonpay.com, please be aware that this is not us.


#J-18808-Ljbffr

Related Jobs

View all jobs

Senior Security Engineer

Senior Security Engineer

Senior Security Engineer - Automation

Senior Security Engineer, AWS Security

Senior Security Engineer London

Senior Security Engineer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.