Providence
Senior Principal Security Engineer IS, Cyber Threat Intelligence *Hybrid*
Providence, Redmond, Washington, United States, 98052
Providence caregivers are not simply valued – they’re invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them.
Providence Health is seeking a Senior Principal Security Engineer with a threat hunting and cyber threat intelligence background. You will play a crucial role on the Cyber Threat Intelligence team and in our cybersecurity strategy, leveraging deep threat hunting expertise to lead CTI’s efforts in tracking, identifying, analyzing, and mitigating emerging threats targeting our healthcare infrastructure. You will also play a key role in articulating the threat landscape to senior leadership and in support of Providence’s Threat Detection and Response operations, informing risk and executive leadership decision-making.
Providence offers hybrid work options for candidates living within a daily commuting distance — up to 65 miles—from any of our primary office locations listed below.
Washington: Seattle, Redmond, Renton, Vancouver
California: Los Angeles, Irvine
Oregon: Portland
Please note the following important details regarding this position:
This is a hybrid role, involving a combination of in-office and remote work each week.
The weekly hybrid schedule will be determined by the manager based on departmental needs.
Essential Functions:
Lead advanced threat hunting initiatives, developing frameworks and methodologies for the team’s hunting and detection efforts.
Foster a culture of learning and development within the team by sharing threat hunting expertise.
Communicate and document hunting methodologies and findings to aid in development of metrics, and present findings and insights to technical and non-technical stakeholders, including executives, to enhance overall cyber threat and risk awareness.
Classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK.
Monitor and assess the healthcare industry threat landscape, including adversaries and their targets, malware, TTPs, emerging threats, and trends that may impact the organization.
Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions.
Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives.
Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations.
Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis.
Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense.
Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations.
Required Qualifications:
Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education and experience
Upon hire: CISSP, CISM, CEH, or equivalent
10 or more years of related experience
Experience performing in an Incident Commander role for cyber incidents and issues affecting business operations across the environment and drive resolution of those issues.
In depth experience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks.
Preferred Qualifications:
Master's Degree in Computer Engineering, Computer Science, Mathematics, Engineering
Experience in a Healthcare environment
At least 10 years of experience in a dedicated threat hunting role
Minimum of 5 years’ experience in a dedicated threat hunting role at the Principal or Senior Principal level, or an equivalent position.
Strong experience in malware sandbox analysis and analyzing IOCs, TTPs, and a variety of logs to uncover threats and implement detections.
Strong experience communicating threat intelligence to senior leadership, tailoring information to both technical and non-technical audiences.
Experience in knowledge sharing back to colleagues to foster a culture of professional skills development and growth is highly desirable.
Experience conducting in-depth analysis on cyber threats, including identifying threat actors’ motivations, intent, and TTPs.
Proficiency with CrowdStrike query language desirable, also Python or other programming language.
A deep understanding of threat intelligence, incident response, and threat hunting frameworks, methodologies, and approaches.
Demonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain, Diamond Model of Intrusion Analysis, others.
Salary Range by Location:
California: Los Angeles, Irvine: Min: $79.43, Max: $135.24
Oregon: Portland Service Area: $76.20, Max: $129.74
Washington: Seattle, Redmond, Renton: Min: $79.43, Max: $135.24
Washington: Vancouver: $76.20, Max: $129.74
Why Join Providence? Our best-in-class benefits are uniquely designed to support you and your family in staying well, growing professionally, and achieving financial security. We take care of you, so you can focus on delivering our Mission of caring for everyone, especially the most vulnerable in our communities.
#J-18808-Ljbffr
Providence Health is seeking a Senior Principal Security Engineer with a threat hunting and cyber threat intelligence background. You will play a crucial role on the Cyber Threat Intelligence team and in our cybersecurity strategy, leveraging deep threat hunting expertise to lead CTI’s efforts in tracking, identifying, analyzing, and mitigating emerging threats targeting our healthcare infrastructure. You will also play a key role in articulating the threat landscape to senior leadership and in support of Providence’s Threat Detection and Response operations, informing risk and executive leadership decision-making.
Providence offers hybrid work options for candidates living within a daily commuting distance — up to 65 miles—from any of our primary office locations listed below.
Washington: Seattle, Redmond, Renton, Vancouver
California: Los Angeles, Irvine
Oregon: Portland
Please note the following important details regarding this position:
This is a hybrid role, involving a combination of in-office and remote work each week.
The weekly hybrid schedule will be determined by the manager based on departmental needs.
Essential Functions:
Lead advanced threat hunting initiatives, developing frameworks and methodologies for the team’s hunting and detection efforts.
Foster a culture of learning and development within the team by sharing threat hunting expertise.
Communicate and document hunting methodologies and findings to aid in development of metrics, and present findings and insights to technical and non-technical stakeholders, including executives, to enhance overall cyber threat and risk awareness.
Classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK.
Monitor and assess the healthcare industry threat landscape, including adversaries and their targets, malware, TTPs, emerging threats, and trends that may impact the organization.
Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions.
Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives.
Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations.
Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis.
Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense.
Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations.
Required Qualifications:
Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education and experience
Upon hire: CISSP, CISM, CEH, or equivalent
10 or more years of related experience
Experience performing in an Incident Commander role for cyber incidents and issues affecting business operations across the environment and drive resolution of those issues.
In depth experience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks.
Preferred Qualifications:
Master's Degree in Computer Engineering, Computer Science, Mathematics, Engineering
Experience in a Healthcare environment
At least 10 years of experience in a dedicated threat hunting role
Minimum of 5 years’ experience in a dedicated threat hunting role at the Principal or Senior Principal level, or an equivalent position.
Strong experience in malware sandbox analysis and analyzing IOCs, TTPs, and a variety of logs to uncover threats and implement detections.
Strong experience communicating threat intelligence to senior leadership, tailoring information to both technical and non-technical audiences.
Experience in knowledge sharing back to colleagues to foster a culture of professional skills development and growth is highly desirable.
Experience conducting in-depth analysis on cyber threats, including identifying threat actors’ motivations, intent, and TTPs.
Proficiency with CrowdStrike query language desirable, also Python or other programming language.
A deep understanding of threat intelligence, incident response, and threat hunting frameworks, methodologies, and approaches.
Demonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain, Diamond Model of Intrusion Analysis, others.
Salary Range by Location:
California: Los Angeles, Irvine: Min: $79.43, Max: $135.24
Oregon: Portland Service Area: $76.20, Max: $129.74
Washington: Seattle, Redmond, Renton: Min: $79.43, Max: $135.24
Washington: Vancouver: $76.20, Max: $129.74
Why Join Providence? Our best-in-class benefits are uniquely designed to support you and your family in staying well, growing professionally, and achieving financial security. We take care of you, so you can focus on delivering our Mission of caring for everyone, especially the most vulnerable in our communities.
#J-18808-Ljbffr