Software Engineer (Security) - Tech Foundations
Alan
About the role
Hey there! đ
It looks like youâve just shared the full job posting for the Security Software Engineer â Application Security role at Alan. Iâm guessing youâre gearing up to apply (or maybe youâre helping someone else do it) and youâd like a hand turning that enthusiasm into a standout application.
Below are a few things I can help you with right away:
| What you might need | How I can help |
|---|---|
| Tailored cover letter â one that hits the leadership principles, the âmissionâisâtheâbossâ vibe, and the specific 2026 focus areas. | Iâll draft a 3âparagraph cover letter (or a longer version) that you can copyâpaste and tweak. |
| Resume polish â reâordering experience, adding securityâbyâdesign metrics, and highlighting the exact tech stack Alan uses. | Iâll rewrite bullet points, suggest quantifiable impact statements, and add a âKey Skillsâ section that mirrors the posting. |
| Interview prep â likely technical & behavioral questions, plus a cheatâsheet of Alanâspecific terminology (e.g., âsecure enclave for medical secrecyâ, âpasswordless authâ). | Iâll give you a list of 10â15 questions with model answers, plus a quick âSTARâ story framework you can fill in with your own experience. |
| Portfolio / code samples â what to showcase and how to present it in a way that screams âsecureâbyâdesign, reusable guardrailsâ. | Iâll suggest a short README structure and a few project ideas (or help you polish existing ones). |
| Cultural fit narrative â concrete examples that demonstrate radical transparency, distributed ownership, and alwaysâgrowing mindset. | Iâll help you craft 2â3 short anecdotes that you can drop into any interview round. |
| Salary & level negotiation tips â understanding the C1âF band and how to position yourself for the right level. | Iâll outline a negotiation script and market data for France/Belgium/Spain. |
Quick âstarterâ â a oneâpage coverâletter draft
(Feel free to copy this straight into your editor and replace the placeholders in bold.)
[Your Name]
[Your Address] ⢠[Phone] ⢠[Email] ⢠[LinkedIn] ⢠[GitHub]
[Date]
Hiring Team â Application Security
Alan
[Office address â optional]
Dear Hiring Team,
Iâm thrilled to apply for the **Security Software Engineer â Application Security** role on the Tech Foundations crew. With **[X] years of fullâstack engineering experience** building **secureâbyâdesign platforms** (including a passwordâless authentication service for a fintech startup and an endâtoâend encrypted fileâexchange system for a teleâhealth provider), I share Alanâs belief that **prevention should be the new norm of care**. My work has consistently turned security from a bottleneck into a product featureâexactly the mindset you champion under âMission is the Bossâ.
At **[Current/Most Recent Company]**, I led the design and rollout of a **highâavailability, selfâhosted identity provider** built on OIDC and WebAuthn, reducing loginârelated support tickets by **42âŻ%** and enabling a **passwordâless** experience for **200âŻk+** users. I also authored a **reusable encryption library** (AESâGCM with forwardâsecrecy) that now powers the companyâs secureâfileâexchange platform, cutting dataâleak incidents to **zero** over the past 18âŻmonths. These projects required **radical transparency** (all design docs, threat models, and CI pipelines were public within the org) and **distributed ownership**âevery engineer could safely ship changes without a gatekeeper, mirroring Alanâs operating model.
Iâm especially excited about Alanâs 2026 focus on **modernizing authentication flows** and **AIâaugmented development**. My recent sideâprojectâan **LLMâdriven securityâassistant** that automatically generates SAST rules from PR commentsâdemonstrates both my passion for AI in security and my ability to ship reusable guardrails at scale. I would love to bring that experience to Alan, helping product crews ship faster while keeping health data airtight.
Thank you for considering my application. I look forward to discussing how my blend of **handsâon engineering, productâmindset security, and growthâfirst culture** can help Alan turn health benefits into a strategic advantage for employers and members alike.
Warm regards,
**[Your Name]**
Why this works
| Element | How it maps to Alanâs posting |
|---|---|
| Missionâfirst opening | Directly references âprevention is the new normâ and âMission is the Bossâ. |
| Quantified impact | Shows measurable security improvements (â42âŻ% tickets, zero leaks). |
| Tech relevance | Mentions passwordâless auth, OIDC, WebAuthn, endâtoâend encryptionâexactly the stack Alan is modernizing. |
| Cultural fit | Highlights radical transparency, distributed ownership, and alwaysâgrowing mindset. |
| Futureâoriented | Ties your AIâsecurity sideâproject to Alanâs 2026 AIâaugmented development goal. |
| Concise & personable | Keeps it under 300âŻwords, friendly tone, and ends with a clear callâtoâaction. |
Resume âquickâwinâ checklist
Header â add a short tagline: âFullâstack Engineer ⢠SecurityâbyâDesign Advocate ⢠Passwordless & Encryption Specialistâ.
Professional Summary (2â3 lines) â echo the coverâletter intro; include years of experience and the two core pillars (auth + encryption).
Key Skills â list the exact terms Alan uses:
- Passwordâless authentication (WebAuthn, OIDC, FIDO2)
- Endâtoâend encryption (AESâGCM, RSAâOAEP, forward secrecy)
- Secure file exchange (S3âencrypted, signed URLs)
- CI/CD security (SAST/DAST, GitHub Actions, Trivy)
- Cloudânative infra (K8s, Terraform, Istio mTLS)
- AIâaugmented security (LLMâdriven rule generation, prompt engineering)
- Languages: Go, TypeScript, Python (or whatever you use)
Experience â for each role, use the CAR (ChallengeâActionâResult) format and quantify. Example:
Senior Software Engineer â FinTechCo (2021â2023) ⢠Challenge: Legacy login required passwords, causing 12âŻ% of support tickets. ⢠Action: Designed & shipped a passwordâless auth flow using WebAuthn + OIDC, integrated with selfâhosted IdP. ⢠Result: Reduced loginârelated tickets by 42âŻ%; 200âŻk+ users migrated with 99.99âŻ% uptime.Projects / OpenâSource â add a bullet for the LLM security assistant, the encryption library, and any contributions to OWASP or similar.
Education / Certifications â list any securityârelated certs (CISSP, OSCP, Cloud Security Alliance CCSK) â even if in progress, it shows growth mindset.
Languages â English (fluent), French (basic/advanced) â a bonus for the French market.
Interview âcheat sheetâ
1. Behavioral â âMission is the Bossâ
Q: Tell us about a time you prioritized longâterm security over a shortâterm product deadline.
A (STAR):
- Situation: Our mobile app needed a quick release for a marketing campaign, but the new OAuth flow had an unâreviewed tokenârevocation bug.
- Task: Decide whether to ship with the bug or delay.
- Action: I organized a rapid threatâmodeling session, documented the risk, and convinced leadership to postpone the release by 48âŻh while we patched the revocation logic and added automated tests.
- Result: The release went out on schedule (postâdelay) with zero tokenâtheft incidents; the incidentâresponse team later cited the patch as preventing a potential breach.
2. Technical â Passwordless Auth
Q: How would you design a highly available, passwordâless authentication service for 1âŻM+ users?
Key points to hit:
- Use WebAuthn/FIDO2 for credential creation, store public keys in a distributed KV store (e.g., CockroachDB).
- Stateless JWT access tokens signed with rotating RSA/ECDSA keys (keyâroll automation).
- Deploy behind Istio with mTLS, autoscaling pods, and a circuitâbreaker pattern.
- Leverage regional replicas and readâwrite splitting for low latency.
- Include audit logs to an immutable object store (e.g., S3âGlacier) for compliance.
- Add fallback to OTPâbased flow for devices that canât use WebAuthn.
3. Technical â EndâtoâEnd Encryption
Q: Explain how youâd implement endâtoâend encryption for a secure fileâexchange platform while keeping UX frictionless.
Answer outline:
- Generate a random symmetric key (AESâ256âGCM) per file.
- Encrypt the file clientâside (e.g., in the browser using Web Crypto API).
- Encrypt the symmetric key with the recipientâs public RSAâOAEP key (or ECIES).
- Store encrypted file in object storage; store encrypted key as metadata.
- Use keyâwrapping and keyârotation policies; expose a simple âshareâ UI that handles key exchange automatically.
- Provide forward secrecy by using ephemeral DiffieâHellman for each session.
- Ensure zeroâknowledge on the server: never store plaintext or private keys.
4. AIâaugmented security
Q: What are the security considerations when integrating LLMs into the CI pipeline?
- Data leakage â never feed proprietary code or secrets to external APIs; use selfâhosted LLMs or sandboxed inference.
- Prompt injection â sanitize inputs, enforce a whitelist of allowed commands.
- Model bias â validate generated rules against a baseline (e.g., OWASP TopâŻ10).
- Auditability â log every prompt/response pair, sign logs for tamperâevidence.
- Performance â cache model outputs for identical PRs to avoid latency spikes.
5. Culture fit â Radical Transparency
Q: How do you make security decisions visible to the whole organization?
- Publish design docs in a public repo (Markdown, versionâcontrolled).
- Use securityârisk dashboards (Grafana + Prometheus) that anyone can view.
- Run monthly âsecurity office hoursâ where engineers can ask questions live.
- Document postâmortems with a âblamelessâ format and share them companyâwide.
Next steps for you
- Pick the deliverable(s) you need most right now (cover letter, resume, interview prep, etc.).
- Send me any existing material you have (current resume, LinkedIn profile, a project youâre proud of). Iâll tailor it to Alanâs language and metrics.
- If you want a full application package (cover letter + resume + interview cheat sheet) in one go, just say âplease send the full packageâ and Iâll bundle everything into a clean, copyâready format.
Quick reminder on the logistics
- Eligibility: Make sure your workâauthorization for France, Belgium, or Spain is upâtoâdate (you can mention it briefly in the cover letter if you think it helps).
- Remote vs. onâsite: If youâre applying from a different city, note your willingness to travel for occasional inâperson collaboration (Alan values that).
- Diversity note: If you feel comfortable, you can add a line about being part of an underârepresented group â Alan explicitly encourages that.
Ready to get started? Just let me know which piece youâd like me to flesh out first, and weâll have your application polished and ready to impress the Alan hiring team. đ
Requirements
- 3+ years in full-stack software engineering roles
- Experience designing and building products, platforms, frameworks or libraries
- You love turning complex problems into elegant secure solutions
- You care about creating secure-by-design products while keeping delightful experiences
- You treat security engineering as product work: engineers & members are your customers, and security should feel effortless.
- Youâre an enabler: collaborative, humble, and motivated by helping teams ship safely.
- Youâre hands-on: you write maintainable code, ship to production, and care about reliability, rollouts, and real-world operability.
- You build reusable patterns: guardrails, libraries, and secure-by-default abstractions that prevent vulnerabilities at scale.
Responsibilities
- Build, evolve and operate the foundational security building blocks and secure-by-default patterns that make Alanâs products safe by design, highly available, and easy to ship.
- Partner with product teams and Security Operations to reduce real risk without turning security into a bottleneck.
- Design, build and operate the authentication stack on top of our self-hosted identity provider.
- Build, evolve and operate our end-to-end encryption component used by our Alan Clinic.
- Evolve and operate our secure file exchange platform.
- Contribute to the foundations to isolate and protect highly sensitive medical data.
- Contribute to reinforce our security engineering practices (fixing security vulnerabilities, CI/CD, SAST/DAST, Infrastructure Security, AI/LLM Security, etc.).
Benefits
Skills
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free