Senior Principal Security Engineer IS, Cyber Threat Intelligence *Hybrid
Vancouver, Clark County, Washington, 98662, USA
Listed on 2025-12-03
-
IT/Tech
Cybersecurity
Description
Providence caregivers are not simply valued - they're invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them.
Job OverviewProvidence Health is seeking a Senior Principal Security Engineer with a threat hunting and cyber threat intelligence background. You will play a crucial role on the Cyber Threat Intelligence team and in our cybersecurity strategy, leveraging deep threat hunting expertise to lead CTI's efforts in tracking, identifying, analyzing, and mitigating emerging threats targeting our healthcare infrastructure. You will also play a key role in articulating the threat landscape to senior leadership and in support of Providence's Threat Detection and Response operations, informing risk and executive leadership decision-making.
HybridWork Options
Providence offers hybrid work options for candidates living within a daily commuting distance
-up to 65 miles-from any of our primary office locations listed below.
- Washington:
Seattle, Redmond, Renton, Vancouver - California:
Los Angeles, Irvine - Oregon:
Portland
- This role requires flexibility to participate in a rotational on-call schedule to maintain system availability and troubleshoot critical issues outside of regular hours.
- This is a hybrid role, involving a combination of in-office and remote work each week.
- The weekly hybrid schedule will be determined by the manager based on departmental needs.
- Lead advanced threat hunting initiatives, developing frameworks and methodologies for the team's hunting and detection efforts.
- Foster a culture of learning and development within the team by sharing threat hunting expertise.
- Communicate and document hunting methodologies and findings to aid in development of metrics, and present findings and insights to technical and non-technical stakeholders, including executives, to enhance overall cyber threat and risk awareness.
- Classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK.
- Monitor and assess the healthcare industry threat landscape, including adversaries and their targets, malware, TTPs, emerging threats, and trends that may impact the organization.
- Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions.
- Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives.
- Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations.
- Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis.
- Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense.
- Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations.
- Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering
-OR- a combination of equivalent education and experience - Upon hire: CISSP, CISM, CEH, or equivalent
- 10 or more years of related experience
- Experience performing in an Incident Commander role for cyber incidents and issues affecting business operations across the environment and drive resolution of those issues.
- In depth experience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks.
- Master's Degree in Computer Engineering, Computer Science, Mathematics, Engineering
- Experience in a Healthcare environment
- At least 10 years of experience in a dedicated threat hunting role
- Minimum of 5 years' experience in a dedicated threat hunting role at the Principal or Senior Principal level, or an equivalent position.
- Strong experience in malware sandbox analysis and analyzing IOCs, TTPs, and a variety of logs to uncover threats and implement detections.
- Strong experience communicating threat intelligence to senior leadership, tailoring information to both technical and non-technical audiences.
- Experience in knowledge sharing back to colleagues to foster a culture of professional skills development and growth is highly desirable.
- Experience conducting in-depth analysis on cyber threats, including identifying threat actors' motivations, intent, and TTPs.
- Proficiency with Crowd Strike query language desirable, also Python or other programming language.
- A deep understanding of threat intelligence, incident response, and threat hunting frameworks,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).