Descripción de la oferta
About Us
INFINNI is building the infrastructure that powers the creator economy. We’re a technology company reimagining how creators work by designing powerful, modern tools that make it simple to manage, distribute, and scale their work.
Asegúrese de leer detenidamente la información sobre esta oportunidad antes de presentar su candidatura.
The creator economy is on track to exceed $480B by 2027, yet the software powering it is fragmented and outdated. We’re here to change that. Our ecosystem of products—trusted by the biggest names in the industry—streamlines content management, distribution, and monetization.
We’re a global team of 150+ engineers, designers, marketers, and operators with experience at Meta, TikTok, Microsoft, N26, TIER, and WeWork. United by a shared mission: to empower creators to grow across platforms and markets by centralizing their content, sales, and operations into a single connected ecosystem.
The Role
We’re looking for an IT Governance & Security Specialist (our internal “Technical Bouncer”) to act as INFINNI’s Sword and Shield.
This is a dual-impact role. You will enforce technical discipline by owning our infrastructure security and neutralizing "Shadow IT," while simultaneously managing our IT assets and access controls. Your philosophy is "Security by Design & Audit-Ready": ensuring every system has multiple layers of protection (Defense in Depth) and is ready for inspection at any moment.
Responsibilities
IT Asset Management & Access Control (The "Governor")
Neutralize Shadow IT: Conduct continuous scanning to identify, map, and purge unauthorized tools or data silos that jeopardize our liability shield.
Manage Identity & Access (IAM): Implement and enforce strict Role-Based Access Control (RBAC) and Zero Trust principles. Ensure strict verification for all users—never trust, always verify.
License Optimization & Asset Control: Partner with Finance to audit our software stack. Eliminate redundant licenses and unused tools to drive cost efficiency (aiming to self-fund part of your role through these savings).
SaaS & Tooling Governance: rigorous onboarding and offboarding of internal tools. You control what software enters the ecosystem and who has the keys to use it.
Cybersecurity & Infrastructure Defense (The "Guardian")
Perimeter & Endpoint Security: Deploy and manage EDR (Endpoint Detection and Response) solutions and cloud defenses to protect against sophisticated external threats.
Incident Response: Monitor potential threats (using Dark Data intelligence and logs) and lead the response to any security incidents, ensuring business continuity.
Hardening Infrastructure: Protect the company against ransomware and extortion-focused attacks by hardening endpoints, servers, and cloud environments.
Certification Readiness: Design technical controls that map simultaneously to SOC 2 and ISO 27001, ensuring technical evidence (logs, configs) is generated automatically.
Hard Skills (Must-Haves & Nice-to-Haves)
To succeed as our Technical Bouncer, ensuring both operational efficiency and fortress-level security, the candidate should have:
Must-Have
IT Operations & Asset Management (ITAM)
Experience with MDM (Mobile Device Management) tools (e.g., Jamf, Kandji, Intune) for fleet management.
Deep knowledge of Identity Providers (IdP) and IAM (e.g., Okta, Google Workspace, Azure AD), specifically configuring SSO, MFA, and RBAC policies.
Proven track record in "Shadow IT" discovery and SaaS management (reducing tool sprawl).
Cybersecurity & Defense
Hands-on experience deploying and managing EDR/XDR solutions (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint).
Understanding of Zero Trust architecture principles.
Experience with vulnerability scanning and patch management workflows.
Cloud Security
Familiarity with securing cloud infrastructure (AWS, GCP, or Azure).
Nice-to-Have
Compliance Frameworks
Experience implementing controls for SOC 2, ISO 27001, or GDPR.
Scripting & Automation
Proficiency in Python, Bash, or PowerShell to automate security checks and evidence collection.
Certifications
CISSP, CISM, CompTIA Security+, or vendor-specific certifications (AWS Security, Okta Certified).
What’s in it for you
Competitive Salary: Attractive compensation package commensurate with experience and skills.
Remote Work and Yearly Company Offsite: Flexible working hours and location options.
Professional Growth: Opportunity to build the security culture of a scaling tech company from the ground up.
Inclusive Culture: Be part of a diverse, collaborative team committed to building responsibly.
Meaningful Impact: You act as the guardian of our reputation. xiphteb Your work directly prevents breaches and optimizes significant budget by rationalizing our toolset.