Help shape the next generation of ecommerce for the next generation of consumer.

Technology @ StockX:

Our Technology Team is on a mission to build the next generation e-commerce platform for the next generation customer. We build world-class, innovative experiences and products that give our users access to the world’s most-coveted products and unlock economic opportunity by turning reselling into a business for anyone. Our team uses cutting edge technologies that handle massive scale globally. We’re an internet-native, cloud-native company from day 1 - you won’t find legacy technology here. If you’re a curious leader who loves solving problems, wearing multiple hats, and learning new things, join us!

About the role:

Our mission requires that users have deep trust in the company where they store their personal information. We are looking for a Senior Security Engineer to join us on this mission. You will report directly to the Director of Security Engineering.

The candidate will demonstrate drive, intelligence, maturity, and energy, and will be a proven change leader. They will be responsible for leading tactical and strategic initiatives and coordinate projects within Security, Engineering, IT, Product, Legal, Compliance, and other teams throughout the company. This role is also responsible for protecting StockX’s computers, networks, and data against threats, such as security breaches, computer viruses, or attacks by cyber criminals.  The ideal candidate will be a thought leader throughout the design, development, integration, testing, and implementation of appropriate security controls during the lifecycle. Candidate must have proven experience leading teams in a matrix environment.

The candidate will possess a high degree of business acumen and must have a “real world” perspective in order to effectively interact with the technical leaders across the company. Because you will identify and mitigate risks, you will have experience with Cloud Security, Enterprise Security, Security Engineering, and Data Protection in large server environments. You will have a strong presence, drive a sense of urgency, can effectively dive into the technical details, and advise cross functional teams. You will be passionate about the people and the business. You will review and assess technology, processes, and controls; utilizing industry best practices and 

Role and Responsibilities:

  • Drives security efforts across the company to address security requirements. 
  • Defines, delivers, and supports strategic plans for implementing information security.
  • Understands, evaluates, and responds to security incidents.
  • Implements information technology strategies, policies, and procedures by evaluating trends, identifying problems, and anticipating requirements.
  • Stays abreast of emerging security threats and conducts research on emerging products, services, protocols, and standards in support of security improvement.
  • Assists with the reporting, investigation, and resolution of data security incidents.
  • Monitors security risk and tracks exceptions to security policies, standards, and procedures to ensure effective security governance and operational efficiencies.
  • Provides timely reporting & analytics of security engineering design and how it relates to security postures & the threat landscape.
  • Facilitates the development and implementation of appropriate security configurations, policies, processes, and procedures.
  • Is a proven innovator and creative problem-solver. Navigates ambiguity and exercises a moderate degree of autonomy in decision making.
  • Identifies risk of impeded work and provides proposed solutions to the management.
  • Ensures the following services meet security requirements and standards: monitoring & log analysis, hunting operations, compromise assessments, forensics analysis, root cause analysis, investigation assistance, insider threat management, and incident management.
  • Strong understanding of information security operations and the relationship between threats, vulnerabilities, and risk management. 
  • Develops and maintains a global information security incident response plan that will identify, contain and resolve information security incidents; and meet compliance requirements.

Personal Qualities:

  • Excellent verbal, written and interpersonal communications skills, including the ability to communicate security and risk-related concepts to both technical and non-technical audiences.
  • Ability to maintain a high level of discretion and personal integrity in the exercise of duties, including the ability to professionally address confidential matters.
  • Ability to establish and maintain a high level of trust and confidence in the group's knowledge of, and concerns for, business, legal and regulatory requirements.
  • Proven experience leading global teams, projects and implementations.
  • Knowledge of operating in a complex, global environment.
  • Ability to coach, motivate and develop careers of others within a global team.

Technical Qualifications:

  • Certifications: PMP, CISSP, CISM, ITIL, TOGAF, SANS/GSEC, CIPP, CRISC, CPA/CA, CFE
  • Bachelor’s degree in an engineering or similar discipline, or equivalent work experience.
  • Minimum of 10-12 years of experience in Information Security space spanning network security, application security, cryptography, SDLC security tools/practices, threat management, penetration testing, abuse, fraud, security compliance, incident response.
  • Experience developing, implementing or creating information security systems with a strong understanding of information security regulatory requirements and compliance issues such as GDPR, PCI, SOX, HIPAA, CCPA, and NIST CSF.
  • Strong understanding of VPN, anti-virus software, intrusion detection, firewalls, and content filtering, endpoint security solutions to include file integrity monitoring and data loss prevention, AWS security tools: SecurityHub, GuardDuty, CloudTrail, CloudWatch, and Crowdstrike, Lacework, DataDog, Cortex, Snyk.
  • Technical understanding of how threats like Spam, Phishing, Bots, DDoS Attacks, Brute Force Attacks, SQL Injections, XSS, Trojan Horses are executed and how to protect our resources.
  • Experience to design approaches to continuously monitor organization's networks and systems for security breaches or intrusions.
  • Experience in designing best practices for protecting critical customer data.
About Us

Our global platform offers unprecedented access to current culture while our data-driven, bid-ask model provides buyers with the real-time visibility to know they’re getting a fair price. And, unlike other ecommerce sites, StockX hand-checks every purchase (20,000+ daily trades) at one of our regional authentication centers.

StockX’s special formula has rocketed the company to a multibillion dollar valuation, with 10M+ lifetime trades on the platformmore than half of those coming in the last year. And we’re just getting started.
 
 
We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. This job description is intended to convey information essential to understanding the scope of the job and the general nature and level of work performed by job holders within this job. However, this job description is not intended to be an exhaustive list of qualifications, skills, efforts, duties, responsibilities or working conditions associated with the position. StockX reserves the right to amend this job description at any time.

Apply for this Job

* Required

  
  


U.S. Equal Opportunity Employment Information (Completion is voluntary)

Individuals seeking employment at StockX are considered without regards to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, or sexual orientation. You are being given the opportunity to provide the following information in order to help us comply with federal and state Equal Employment Opportunity/Affirmative Action record keeping, reporting, and other legal requirements.

Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file.

Race & Ethnicity Definitions

If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection. As a government contractor subject to Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measure the effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categories is as follows:

A "disabled veteran" is one of the following: a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability.

A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service.

An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense.

An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.


Form CC-305

OMB Control Number 1250-0005

Expires 05/31/2023

Voluntary Self-Identification of Disability

Why are you being asked to complete this form?

We are a federal contractor or subcontractor required by law to provide equal employment opportunity to qualified people with disabilities. We are also required to measure our progress toward having at least 7% of our workforce be individuals with disabilities. To do this, we must ask applicants and employees if they have a disability or have ever had a disability. Because a person may become disabled at any time, we ask all of our employees to update their information at least every five years.

Identifying yourself as an individual with a disability is voluntary, and we hope that you will choose to do so. Your answer will be maintained confidentially and not be seen by selecting officials or anyone else involved in making personnel decisions. Completing the form will not negatively impact you in any way, regardless of whether you have self-identified in the past. For more information about this form or the equal employment obligations of federal contractors under Section 503 of the Rehabilitation Act, visit the U.S. Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) website at www.dol.gov/ofccp.

How do you know if you have a disability?

You are considered to have a disability if you have a physical or mental impairment or medical condition that substantially limits a major life activity, or if you have a history or record of such an impairment or medical condition.

Disabilities include, but are not limited to:

  • Autism
  • Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, or HIV/AIDS
  • Blind or low vision
  • Cancer
  • Cardiovascular or heart disease
  • Celiac disease
  • Cerebral palsy
  • Deaf or hard of hearing
  • Depression or anxiety
  • Diabetes
  • Epilepsy
  • Gastrointestinal disorders, for example, Crohn's Disease, or irritable bowel syndrome
  • Intellectual disability
  • Missing limbs or partially missing limbs
  • Nervous system condition for example, migraine headaches, Parkinson’s disease, or Multiple sclerosis (MS)
  • Psychiatric condition, for example, bipolar disorder, schizophrenia, PTSD, or major depression

1Section 503 of the Rehabilitation Act of 1973, as amended. For more information about this form or the equal employment obligations of Federal contractors, visit the U.S. Department of Labor's Office of Federal Contract Compliance Programs (OFCCP) website at www.dol.gov/ofccp.

PUBLIC BURDEN STATEMENT: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete.