Trail of Bits Logo

Trail of Bits

IT Operations Engineer

Posted An Hour Ago
Be an Early Applicant
Remote
Hiring Remotely in United States
Mid level
Remote
Hiring Remotely in United States
Mid level
Trail of Bits seeks an IT Operations Engineer to manage IT infrastructure, enhance security compliance, and improve the technology experience for a remote cybersecurity team. Responsibilities include endpoint management, identity & access management, cloud infrastructure oversight, automation of tasks, and maintaining comprehensive documentation.
The summary above was generated by AI

Trail of Bits is a cybersecurity firm of ~100 people across 14+ countries, fully remote since our founding in 2012. We conduct security audits, build research tools, and set standards the industry adopts. Our clients include the largest tech companies, financial institutions, and government agencies.

The Role

Trail of Bits seeks an IT Operations Engineer to own and evolve our internal IT infrastructure, security compliance, and employee technology experience.

Here's what makes this different from IT at most companies: our workforce is security researchers and engineers. They audit the cryptographic protocols that protect financial infrastructure, build open-source security tools used across the industry, and assess the security of systems trusted by millions of users. They have strong, specific opinions about how corporate IT should be configured -- and they're usually right. Your job is to listen to that expertise, implement it reliably, and build the automation and tooling that keeps our systems in a state that matches the standards we set for our clients. You'll take technical direction from people who deeply understand the threat landscape, and you'll exercise your own initiative to build, improve, and automate everything you touch.

Our IT infrastructure has scaled with the company over 14 years, and like any growing organization, it needs someone who can assess what's in place, strengthen the foundations, and build from there. Your first priority will be understanding the environment end-to-end -- auditing what's deployed against what's documented, establishing operational discipline across our toolchain, and closing gaps. Once the foundation is solid, you'll build the automation and self-service tooling that takes our operations to the next level.

This is a builder role with high accountability. You'll write production-quality code -- not just scripts that work, but tools that scale. You'll automate repetitive tasks, build self-service tooling, and promote consistent, seamless experiences for a fully remote and globally distributed team. You'll also be responsible for endpoint management, SaaS administration, security compliance, and cloud infrastructure.

The ideal candidate possesses a "no task too small, no task too big" attitude, proactively owns and solves problems, and thrives working autonomously as the primary IT person for a deeply technical team. You should be comfortable balancing initiative -- you see the gap and close it -- with the discipline to take direction, document transparently, and never cut corners on process.

This role is open to candidates authorized to work in the United States.

What You'll Achieve

Endpoint Device Management

  • Test, deploy, and maintain MDM solutions (Jamf Pro) and endpoint security tools (CrowdStrike Falcon, iVerify)
  • Our fleet is primarily macOS (~100 devices), with additional Windows and Linux endpoints driven by the diversity of our client and research work. Expert-level macOS management is the foundation; candidates with multi-OS experience will thrive given the breadth of our engagements.
  • Maintain strict parity between the configuration repository and what is deployed across the fleet. The repo is the source of truth -- drift between documented and deployed state is unacceptable.
  • Manage Apple Business Manager, device lifecycle (ordering, provisioning, recovery), and automated onboarding/offboarding workflows
  • Enforce macOS update policies and patch management across the fleet

Identity & Access Management

  • Manage identity and access across the SaaS ecosystem including Google Workspace (with Context-Aware Access), 1Password, Microsoft Entra, GitHub, Slack, and other platforms
  • Set up and integrate new systems with SSO (SAML, OIDC, OAuth 2.0)
  • Enforce account lifecycle hygiene: provisioning on day one, prompt suspension on departure, regular audits of authorized devices and access
  • Maintain organizational systems for credential management -- vaults, naming conventions, cross-references

Security & Compliance

  • Maintain SOC 2 compliance posture and manage compliance automation platforms (Vanta)
  • Respond to client security questionnaires and provide compliance documentation for engagements across government, defense, and enterprise sectors
  • Manage endpoint detection and response (CrowdStrike Falcon), network canaries (Thinkst), email security (Material Security), and mobile device verification (iVerify)
  • Proactively maintain security posture through vulnerability scanning, configuration audits, and patch management
  • Monitor for and respond to supply chain threats -- package manager attacks, extension supply chain risks, dependency vulnerabilities -- with real-time detection where possible
  • Write and maintain security policies, runbooks, and documentation

Cloud Infrastructure

  • Manage and rationalize cloud infrastructure across GCP and other providers -- understand what's running, why, what it costs, and whether it should still exist
  • Maintain accurate inventory, eliminate waste, and enforce least-privilege access for service accounts and cloud IAM
  • Develop reporting to monitor fleet health, compliance state, and infrastructure costs

Automation & Tooling

  • Automate repetitive tasks across the company through scripting and custom tooling
  • Build internal tools to improve employee self-service
  • Maintain and extend workflow automation and internal tooling infrastructure
  • Manage developer tooling governance: Claude API access, VS Code extension security, GitHub organization administration and Advanced Security
  • Evaluate and implement new technologies to improve operational efficiency -- with rigorous vetting. In an era of AI-generated and AI-adjacent tooling, we hold ourselves to a higher standard for what enters our environment. Every tool, integration, and dependency must be evaluated for security posture before adoption.

Documentation & Transparency

  • Document every configuration, script, and policy change in GitHub and public Slack channels. Anyone in the organization should be able to understand what is running on their machine at any given time.
  • Work visibly. Planned changes announced in advance, coverage gaps flagged early, status always obvious. Leadership should never have to ask what's happening in IT.
  • Maintain the IT scripts and configuration repository as the single source of truth for what is deployed across the fleet.

Technical Support & Availability

  • Provide technical support and guidance to employees in a remote-first environment via Slack
  • Provide coverage for critical issues outside standard business hours -- password resets, account lockouts, and urgent security events cannot always wait for Monday
  • Review code contributions to IT repositories and provide meaningful technical feedback
  • Identify security events and integrate alerting processes into Slack

Why This Role Matters

At most companies, IT security is a checkbox exercise. At Trail of Bits, our internal security posture is an extension of our reputation. Our employees audit critical infrastructure for the world's most targeted organizations -- they notice when their own company's systems fall short. Nation-state adversaries have real reasons to target a firm like ours. The IT Operations Engineer is the person who ensures that our internal systems are as resilient as the standards we set for our clients.

When you do this well, 100 people across 14 countries work without friction, leadership never has to intervene in IT, and our own house is in order -- visibly, provably, and at all times.


Requirements

Experience

  • Significant experience in IT Operations, DevOps, or Systems Administration -- we care more about what you can demonstrate than how many years you've been doing it
  • Strong background in endpoint management using MDM systems or open-source tools
  • Previous experience as the primary or solo IT person at a company
  • Experience inheriting and improving existing infrastructure -- not just greenfield builds

Programming & Automation

  • Strong programming skills in Python and Bash
  • Comfortable writing production-quality scripts and tools that scale, not just code that works
  • Experience automating workflows and building internal tooling
  • Able to review others' code and provide constructive, technically grounded feedback

Endpoint & Platform Expertise

  • Expert-level macOS administration experience with deep familiarity with MDM, system configuration, and endpoint management
  • Experience managing Windows and Linux devices

Identity & Access Management

  • Experience with authentication and access control protocols including OAuth 2.0, SAML, FIDO/U2F, TOTP/HOTP, and other multi-factor authentication methods
  • Experience with Google Workspace administration, 1Password or similar credential management, and identity providers (Entra or similar)

Cloud Infrastructure

  • Experience managing cloud infrastructure on AWS, Azure, or GCP
  • Demonstrated ability to audit, rationalize, and optimize cloud environments -- not just provision new resources

Compliance & Security

  • SOC 2 compliance knowledge required
  • Experience responding to client security questionnaires and providing compliance documentation
  • Familiarity with NIST SP 800-171, NIST SP 800-53, CMMC, or FedRAMP is a plus
  • Experience with vulnerability scanning and patch management processes
  • Familiarity with zero-trust security architectures is a plus

Communication & Organization

  • Excellent written communication skills -- you'll write documentation, runbooks, and security policies that others rely on
  • Strong organizational skills and ability to manage multiple priorities independently
  • Comfortable providing support and guidance to a remote, technical workforce
  • Systems thinker: you diagnose root causes, not just symptoms, and build processes that prevent recurrence

Nice to Have

  • Background working at a cybersecurity or security-focused organization
  • Experience with infrastructure-as-code
  • Experience inheriting and stabilizing IT environments during periods of organizational growth or transition

Benefits
  • Competitive salary commensurate with experience
  • Comprehensive health insurance
  • Equipment budget
  • Professional development
  • Flexible PTO

Top Skills

1Password
Bash
Crowdstrike Falcon
Git
Google Workspace
Jamf Pro
Linux
macOS
Microsoft Entra
Python
Vanta
Windows

Similar Jobs at Trail of Bits

20 Hours Ago
Remote
United States
Mid level
Mid level
Artificial Intelligence • Blockchain • Professional Services • Security • Consulting • Cybersecurity • Defense
The Security Engineer, Blockchain will review and analyze blockchain applications for security vulnerabilities, develop tools, and contribute to security practices, focusing on smart contracts and blockchain ecosystems.
Top Skills: BlockchainC++EthereumGoRpc InterfacesRustSolidity
10 Days Ago
Remote
United States
140K-170K Annually
Senior level
140K-170K Annually
Senior level
Artificial Intelligence • Blockchain • Professional Services • Security • Consulting • Cybersecurity • Defense
Lead talent acquisition across the organization by sourcing and hiring for technical and non-technical positions, ensuring an exceptional candidate experience and fostering employer branding.
Top Skills: AIAtsClaude Code
10 Days Ago
Remote
United States
100K-150K Annually
Mid level
100K-150K Annually
Mid level
Artificial Intelligence • Blockchain • Professional Services • Security • Consulting • Cybersecurity • Defense
The Employee Experience Manager enhances employee journeys through event management, cultural initiatives, and engagement strategies while supporting HR functions in a remote setting.
Top Skills: Google WorkspaceSlackTrello

What you need to know about the Colorado Tech Scene

With a business-friendly climate and research universities like CU Boulder and Colorado State, Colorado has made a name for itself as a startup ecosystem. The state boasts a skilled workforce and high quality of life thanks to its affordable housing, vibrant cultural scene and unparalleled opportunities for outdoor recreation. Colorado is also home to the National Renewable Energy Laboratory, helping cement its status as a hub for renewable energy innovation.

Key Facts About Colorado Tech

  • Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
  • Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
  • Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
  • Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
  • Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account