Lead Security Engineer (P215)
Cincinnati, OH; Chicago, IL; Deerfield, IL; Portland, OR; United States - Remote
Applications have closed
84.51°
At 84.51° we use unmatched 1st party retail data and analytics powered by cutting edge science to fuel a more customer-centric journey.84.51° Overview:
84.51° is a retail data science, insights and media company. We help the Kroger company, consumer packaged goods companies, agencies, publishers and affiliated partners create more personalized and valuable experiences for shoppers across the path to purchase.
Powered by cutting edge science, we leverage 1st party retail data from nearly 1 of 2 US households and 2BN+ transactions to fuel a more customer-centric journey utilizing 84.51° Insights, 84.51° Loyalty Marketing and our retail media advertising solution, Kroger Precision Marketing.
Join us at 84.51°!
__________________________________________________________
The Security Team partners with the business to enable innovation while ensuring appropriate security policies and practices are in place and sustained. We also help the Company assess risk and recommend new governance, policies, or practices as appropriate.
RESPONSIBILITIES:
- Develop and maintain security by design documentation (e.g., models, templates, standards and procedures) that may be leveraged by Engineering and Product & Design to build security in from the beginning.
- Provide security designs for new software solutions, APIs, platforms, and infrastructure.
- Create and maintain technical documentation of secure solutions, security standards, and policies as needed.
- Utilize security testing for software vulnerabilities and develop new practices that contribute to the secure coding program.
- Participate in the estimation process for new work and releases.
- Develop best practices and insights with the larger security team to liaise with the rest of the organization.
- Troubleshoot and debug issues that arise.
- Maintain and document knowledge of attack vectors that may be used to exploit software.
- Identify and solve challenging problems, identify opportunities, and recommend solutions.
- May coordinate 3rd party penetration tests for new services or applications.
- Mentor fellow teammates as well as cross functional resources
- Work collaboratively across teams
QUALIFICATIONS:
- Bachelor’s degree typically in Cybersecurity, Computer Science, Management Information Systems, Mathematics, Business Analytics, or another technically strong program
- Minimum 3 years of experience working successfully in a security, development, infrastructure, or combined role.
- Hands-on experience or strong working knowledge of the design and deployment of applications and infrastructure into public cloud services
- Working knowledge of security best practices and the how to apply them within an enterprise computing environment.
- Understanding of Agile Principles
- Proven experience in defining, communicating, and implementing security processes or solutions.
- Excellent organizational and time management skills
- Ability to work independently, manage multiple projects, work under pressure, and adapt to sudden changes in the work environment.
- Initiative, detail orientation, strong analytical and decision-making skills
- Strong people and diplomacy skills are required to work in a collaborative environment.
- Strong interpersonal and communication skills (verbal, written, and presentation)
- Model 84.51 values as well as secure behaviors
- Working knowledge in Java or Python
- Understanding Identity and Access management
#LI-Remote #LI-DOLF
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Analytics APIs Cloud Computer Science Exploit Governance IAM Java Mathematics Python Vulnerabilities
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Product Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Senior Information Security Analyst jobs
- Open Cyber Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open Sr. Security Engineer jobs
- Open IT Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open Forensics-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs