Skip to content
mimi

Software Engineer (Security) - Tech Foundations

Alan

Rennes ¡ Hybrid Contract 3d ago

About the role

Hey there! 👋
It looks like you’ve just shared the full job posting for the Security Software Engineer – Application Security role at Alan. I’m guessing you’re gearing up to apply (or maybe you’re helping someone else do it) and you’d like a hand turning that enthusiasm into a standout application.

Below are a few things I can help you with right away:

What you might need How I can help
Tailored cover letter – one that hits the leadership principles, the “mission‑is‑the‑boss” vibe, and the specific 2026 focus areas. I’ll draft a 3‑paragraph cover letter (or a longer version) that you can copy‑paste and tweak.
Resume polish – re‑ordering experience, adding security‑by‑design metrics, and highlighting the exact tech stack Alan uses. I’ll rewrite bullet points, suggest quantifiable impact statements, and add a “Key Skills” section that mirrors the posting.
Interview prep – likely technical & behavioral questions, plus a cheat‑sheet of Alan‑specific terminology (e.g., “secure enclave for medical secrecy”, “passwordless auth”). I’ll give you a list of 10‑15 questions with model answers, plus a quick “STAR” story framework you can fill in with your own experience.
Portfolio / code samples – what to showcase and how to present it in a way that screams “secure‑by‑design, reusable guardrails”. I’ll suggest a short README structure and a few project ideas (or help you polish existing ones).
Cultural fit narrative – concrete examples that demonstrate radical transparency, distributed ownership, and always‑growing mindset. I’ll help you craft 2‑3 short anecdotes that you can drop into any interview round.
Salary & level negotiation tips – understanding the C1‑F band and how to position yourself for the right level. I’ll outline a negotiation script and market data for France/Belgium/Spain.

Quick “starter” – a one‑page cover‑letter draft

(Feel free to copy this straight into your editor and replace the placeholders in bold.)

[Your Name]
[Your Address] • [Phone] • [Email] • [LinkedIn] • [GitHub]

[Date]

Hiring Team – Application Security
Alan
[Office address – optional]

Dear Hiring Team,

I’m thrilled to apply for the **Security Software Engineer – Application Security** role on the Tech Foundations crew. With **[X] years of full‑stack engineering experience** building **secure‑by‑design platforms** (including a password‑less authentication service for a fintech startup and an end‑to‑end encrypted file‑exchange system for a tele‑health provider), I share Alan’s belief that **prevention should be the new norm of care**. My work has consistently turned security from a bottleneck into a product feature—exactly the mindset you champion under “Mission is the Boss”.

At **[Current/Most Recent Company]**, I led the design and rollout of a **high‑availability, self‑hosted identity provider** built on OIDC and WebAuthn, reducing login‑related support tickets by **42 %** and enabling a **password‑less** experience for **200 k+** users. I also authored a **reusable encryption library** (AES‑GCM with forward‑secrecy) that now powers the company’s secure‑file‑exchange platform, cutting data‑leak incidents to **zero** over the past 18 months. These projects required **radical transparency** (all design docs, threat models, and CI pipelines were public within the org) and **distributed ownership**—every engineer could safely ship changes without a gatekeeper, mirroring Alan’s operating model.

I’m especially excited about Alan’s 2026 focus on **modernizing authentication flows** and **AI‑augmented development**. My recent side‑project—an **LLM‑driven security‑assistant** that automatically generates SAST rules from PR comments—demonstrates both my passion for AI in security and my ability to ship reusable guardrails at scale. I would love to bring that experience to Alan, helping product crews ship faster while keeping health data airtight.

Thank you for considering my application. I look forward to discussing how my blend of **hands‑on engineering, product‑mindset security, and growth‑first culture** can help Alan turn health benefits into a strategic advantage for employers and members alike.

Warm regards,

**[Your Name]**

Why this works

Element How it maps to Alan’s posting
Mission‑first opening Directly references “prevention is the new norm” and “Mission is the Boss”.
Quantified impact Shows measurable security improvements (‑42 % tickets, zero leaks).
Tech relevance Mentions password‑less auth, OIDC, WebAuthn, end‑to‑end encryption—exactly the stack Alan is modernizing.
Cultural fit Highlights radical transparency, distributed ownership, and always‑growing mindset.
Future‑oriented Ties your AI‑security side‑project to Alan’s 2026 AI‑augmented development goal.
Concise & personable Keeps it under 300 words, friendly tone, and ends with a clear call‑to‑action.

Resume “quick‑win” checklist

  1. Header – add a short tagline: “Full‑stack Engineer • Security‑by‑Design Advocate • Passwordless & Encryption Specialist”.

  2. Professional Summary (2‑3 lines) – echo the cover‑letter intro; include years of experience and the two core pillars (auth + encryption).

  3. Key Skills – list the exact terms Alan uses:

    • Password‑less authentication (WebAuthn, OIDC, FIDO2)
    • End‑to‑end encryption (AES‑GCM, RSA‑OAEP, forward secrecy)
    • Secure file exchange (S3‑encrypted, signed URLs)
    • CI/CD security (SAST/DAST, GitHub Actions, Trivy)
    • Cloud‑native infra (K8s, Terraform, Istio mTLS)
    • AI‑augmented security (LLM‑driven rule generation, prompt engineering)
    • Languages: Go, TypeScript, Python (or whatever you use)
  4. Experience – for each role, use the CAR (Challenge‑Action‑Result) format and quantify. Example:

    Senior Software Engineer – FinTechCo (2021‑2023)
    • Challenge: Legacy login required passwords, causing 12 % of support tickets.
    • Action: Designed & shipped a password‑less auth flow using WebAuthn + OIDC, integrated with self‑hosted IdP.
    • Result: Reduced login‑related tickets by 42 %; 200 k+ users migrated with 99.99 % uptime.
    
  5. Projects / Open‑Source – add a bullet for the LLM security assistant, the encryption library, and any contributions to OWASP or similar.

  6. Education / Certifications – list any security‑related certs (CISSP, OSCP, Cloud Security Alliance CCSK) – even if in progress, it shows growth mindset.

  7. Languages – English (fluent), French (basic/advanced) – a bonus for the French market.


Interview “cheat sheet”

1. Behavioral – “Mission is the Boss”

Q: Tell us about a time you prioritized long‑term security over a short‑term product deadline.
A (STAR):

  • Situation: Our mobile app needed a quick release for a marketing campaign, but the new OAuth flow had an un‑reviewed token‑revocation bug.
  • Task: Decide whether to ship with the bug or delay.
  • Action: I organized a rapid threat‑modeling session, documented the risk, and convinced leadership to postpone the release by 48 h while we patched the revocation logic and added automated tests.
  • Result: The release went out on schedule (post‑delay) with zero token‑theft incidents; the incident‑response team later cited the patch as preventing a potential breach.

2. Technical – Passwordless Auth

Q: How would you design a highly available, password‑less authentication service for 1 M+ users?
Key points to hit:

  • Use WebAuthn/FIDO2 for credential creation, store public keys in a distributed KV store (e.g., CockroachDB).
  • Stateless JWT access tokens signed with rotating RSA/ECDSA keys (key‑roll automation).
  • Deploy behind Istio with mTLS, autoscaling pods, and a circuit‑breaker pattern.
  • Leverage regional replicas and read‑write splitting for low latency.
  • Include audit logs to an immutable object store (e.g., S3‑Glacier) for compliance.
  • Add fallback to OTP‑based flow for devices that can’t use WebAuthn.

3. Technical – End‑to‑End Encryption

Q: Explain how you’d implement end‑to‑end encryption for a secure file‑exchange platform while keeping UX frictionless.
Answer outline:

  • Generate a random symmetric key (AES‑256‑GCM) per file.
  • Encrypt the file client‑side (e.g., in the browser using Web Crypto API).
  • Encrypt the symmetric key with the recipient’s public RSA‑OAEP key (or ECIES).
  • Store encrypted file in object storage; store encrypted key as metadata.
  • Use key‑wrapping and key‑rotation policies; expose a simple “share” UI that handles key exchange automatically.
  • Provide forward secrecy by using ephemeral Diffie‑Hellman for each session.
  • Ensure zero‑knowledge on the server: never store plaintext or private keys.

4. AI‑augmented security

Q: What are the security considerations when integrating LLMs into the CI pipeline?

  • Data leakage – never feed proprietary code or secrets to external APIs; use self‑hosted LLMs or sandboxed inference.
  • Prompt injection – sanitize inputs, enforce a whitelist of allowed commands.
  • Model bias – validate generated rules against a baseline (e.g., OWASP Top 10).
  • Auditability – log every prompt/response pair, sign logs for tamper‑evidence.
  • Performance – cache model outputs for identical PRs to avoid latency spikes.

5. Culture fit – Radical Transparency

Q: How do you make security decisions visible to the whole organization?

  • Publish design docs in a public repo (Markdown, version‑controlled).
  • Use security‑risk dashboards (Grafana + Prometheus) that anyone can view.
  • Run monthly “security office hours” where engineers can ask questions live.
  • Document post‑mortems with a “blameless” format and share them company‑wide.

Next steps for you

  1. Pick the deliverable(s) you need most right now (cover letter, resume, interview prep, etc.).
  2. Send me any existing material you have (current resume, LinkedIn profile, a project you’re proud of). I’ll tailor it to Alan’s language and metrics.
  3. If you want a full application package (cover letter + resume + interview cheat sheet) in one go, just say “please send the full package” and I’ll bundle everything into a clean, copy‑ready format.

Quick reminder on the logistics

  • Eligibility: Make sure your work‑authorization for France, Belgium, or Spain is up‑to‑date (you can mention it briefly in the cover letter if you think it helps).
  • Remote vs. on‑site: If you’re applying from a different city, note your willingness to travel for occasional in‑person collaboration (Alan values that).
  • Diversity note: If you feel comfortable, you can add a line about being part of an under‑represented group – Alan explicitly encourages that.

Ready to get started? Just let me know which piece you’d like me to flesh out first, and we’ll have your application polished and ready to impress the Alan hiring team. 🚀

Requirements

  • 3+ years in full-stack software engineering roles
  • Experience designing and building products, platforms, frameworks or libraries
  • You love turning complex problems into elegant secure solutions
  • You care about creating secure-by-design products while keeping delightful experiences
  • You treat security engineering as product work: engineers & members are your customers, and security should feel effortless.
  • You’re an enabler: collaborative, humble, and motivated by helping teams ship safely.
  • You’re hands-on: you write maintainable code, ship to production, and care about reliability, rollouts, and real-world operability.
  • You build reusable patterns: guardrails, libraries, and secure-by-default abstractions that prevent vulnerabilities at scale.

Responsibilities

  • Build, evolve and operate the foundational security building blocks and secure-by-default patterns that make Alan’s products safe by design, highly available, and easy to ship.
  • Partner with product teams and Security Operations to reduce real risk without turning security into a bottleneck.
  • Design, build and operate the authentication stack on top of our self-hosted identity provider.
  • Build, evolve and operate our end-to-end encryption component used by our Alan Clinic.
  • Evolve and operate our secure file exchange platform.
  • Contribute to the foundations to isolate and protect highly sensitive medical data.
  • Contribute to reinforce our security engineering practices (fixing security vulnerabilities, CI/CD, SAST/DAST, Infrastructure Security, AI/LLM Security, etc.).

Benefits

health insurancedental insurancevision insurance

Skills

CI/CDDASTSAST

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free