Optomi is seeking a Senior Principal Security Engineer to lead threat and vulnerability management efforts. The ideal candidate will have a strong technical background in information technology, cybersecurity, and vulnerability scanning tools. They will be responsible for identifying, assessing, and prioritizing security vulnerabilities across the IT infrastructure, business applications, and cloud environments.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
Senior Principal Security Engineer (Threat and Vulnerability Management) - Hybrid role*
*This position is Hybrid (4x per week). Candidate can report to the Fort Worth, Las Colinas or Arlington, TX locations. A relocation package is available for non-local candidates.
Optomi, in partnership with a client in the financial services space, is looking to add a Principal Security Engineer over Threat and Vulnerability Management! This is a new position, and the right candidate for this role will help mature the current program in place forcused on both prem and cloud apps.
The Sr. Security Principal Engineer role is responsible for identifying, assessing, analyzing, prioritizing, and coordinating security vulnerabilities across the IT infrastructure, business applications, and cloud environments.
The ideal Security Principal Engineer candidate must have a strong, well-rounded technical background in information technology, cybersecurity, vulnerability scanning tools, and risk assessment methodologies. The ideal candidate must be able to assess all vulnerability risks and accurately articulate and document for both technical and non-technical team members the risk level, impacts, and options for remediation and or mitigation of the risk.
Responsibilities:
- Support and influence technical direction for vulnerability and scanning supporting technology
- Architect, build and maintain scalable vulnerability detection rules, alerts, scripts, and triage pipelines
- Monitor and assess the company’s cybersecurity risks and implement mitigation strategies to address vulnerabilities
- Conduct continuous discovery and vulnerability assessment of enterprise-wide assets, including vulnerability scans in support of operational matters (non-scheduled)
- Serve as a technical escalation point for vulnerability management and remediation efforts
- Define, build and apply protective mitigations and work with engineering and infrastructure teams to integrate fixes upstream, and to support remediation efforts to close vulnerability exposure to new threats
- Interpret complex data from vulnerability scans to pinpoint potential security risks and weaknesses
- Examine disclosed vulnerabilities, threat scenarios, and mitigating controls to understand the potential impact on the organization
- Provide specific recommendations for addressing and mitigating identified vulnerabilities, prioritizing effort based on factors such as risk, exposure, business impact, threat intelligence, and contextual data
- Perform technical analysis of all scan results and provide a report of analysis as required
Looking to advance your Cyber Security career with relocation support? Explore Cyber Security Jobs with Relocation Packages that include comprehensive packages to help you move and settle in your new role.
Qualifications
- Knowledge of AI and ability to apply it within an enterprise environment
- Bachelor's Degree or Associate Degree plus 2 years of relevant experience required
- 12 years minimum experience in related functions
- 5-7 years experience leading through mentorship in a related field
- 5-7 years experience driving thought leadership and innovation across products
- Relevant certifications or licenses preferred
- Experience with leading cross-functional and/or global initiatives from start to finish
- Advanced knowledge of business acumen and a deep understanding of business implications of decisions
- Comprehensive knowledge of Windows, Linux, Unix, and other OS’s vulnerabilities
- Strong experience in threat modeling, secure design, and code review processes and ways to stop them
- Demonstrated knowledge in methods to protect against ransomware threats
- Deep experience building and utilizing highly scalable platforms and tools (e.g., Vulnerability scanners, detection pipelines, analytics systems)
- Robust experience securing hybrid/multi cloud environments (Azure, AWS)
- Proven and verifiable record of building vulnerability tooling and automations integrated into workflows
- Deep understanding of the vulnerability risk landscape and its impact on cyber threats
- Demonstrated experience performing risk assessments of vulnerabilities and evaluating compensating and mitigating controls in large, complex infrastructures
- Knowledge of secure coding practices and application security testing (SAST, DAST, SCA, IaC, etc).
- Strong experience building and operating Vulnerability Management, Threat Intelligence, or other security programs
- Demonstrated experience with DevSecOps and CI/CD methodologies
- Working understanding of CVE, CWE, CVSS scoring, MitRE ATT&CK Framework, threat intelligence, and CISA
Discover our full range of relocation jobs with comprehensive support packages to help you relocate and settle in your new location.
Similar Jobs
Explore other opportunities that match your interests
artemis chase - defence & spac...
arizona small business associa...
Cybersecurity Engineer