Principal Enterprise Security Engineer
Listed on 2025-12-01
-
IT/Tech
Cybersecurity, Systems Engineer, Security Manager, Network Security
Join to apply for the Principal Enterprise Security Engineer role at F5.
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation. Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better.
And it means we prioritize a diverse F5 community where each individual can thrive.
Location:
Remote
Reports To:
VP of Infrastructure and Security
Department:
Infrastructure and Security
We are seeking a seasoned Principal Enterprise Security Engineer to design, implement, and manage enterprise‑wide security solutions. You'll shape our security strategy across endpoint protection, network, SaaS, IAM, and observability, while aligning to NIST and CIS standards. This role reports to the Head of Enterprise Security, with close collaboration with the CISO, CISO staff, and cross‑functional teams.
Key Responsibilities- Security Architecture & Governance
- Architect enterprise security solutions across endpoints (EDR/XDR), networks, SaaS, and identity/infrastructure.
- Ensure compliance with NIST SP800-53, CIS benchmarks, and FedRAMP (Low/Moderate/High) standards.
- Design for DoD Impact Levels IL‑4 and IL‑5 environments, integrating enhanced controls beyond FedRAMP High
- IAM & Access Management
- Implement and manage IAM frameworks: RBAC, MFA, SAML, OAuth, SCIM.
- Regularly review and optimize privilege configurations.
- Endpoint & Network Security
- Deploy and manage endpoint security tools (e.g., Crowd Strike, Sentinel One).
- Define network security strategies including firewalls (e.g., Palo Alto), micro‑segmentation, VPNs.
- Develop and maintain device health assessments and dashboards leveraging device telemetry from enterprise security tooling.
- Configure and maintain Data Loss Prevention (DLP) tooling & policies.
- Support security deployments and configurations across multiple operating systems - Windows 10/11, macOS, Window Server, RHEL, Oracle, CentOS
- Experience with Security Service Edge and Software‑Defined Perimeter enables ZTNA solutions such as NetSCOPE, Zscaler, and PAN
- SaaS Security & Cloud Compliance
- Secure SaaS applications using SSPM tools and integrate them into governance frameworks.
- Maintain compliance evidence for FedRAMP/DoD IL audits and ATO packages
- Incident Response & Threat Intelligence
- Lead incident response efforts: detection, triage, investigation, mitigation, and post‑mortems.
- Coordinate with threat intel teams to feed strategic threat insights into detection logic and tools.
- Vulnerability Management & Observability
- Own vulnerability scanning, CVE tracking, patch‑rollout, and POA&M development.
- Build and tune observability systems (SIEM, EDR, logging, telemetry) to support security posture.
- Automation & Scripting
- Automate security workflows using Python, Power Shell, Bash, or similar languages.
- Integrate automation into tooling for reporting, incident response, compliance, detection, and remediation.
- Collaboration & Communication
- Collaborate with the CISO and staff to align security initiatives with organizational strategy.
- Communicate technical concepts clearly to leadership, compliance, legal, and engineering teams.
- Develop and deliver security training and awareness for teams across the enterprise.
- Education:
Bachelor’s degree in cybersecurity, computer science, engineering—or equivalent years of corporate security/SOC experience. - Experience:
7+ years in enterprise or cloud security with hands‑on background in IAM, endpoint/network/SaaS security, incident management, vulnerability management, and log analytics. - Compliance Know‑How:
- Solid understanding of FedRAMP security controls and audit frameworks.
- Experience with DoD IL‑4/IL‑5 programs—understand added encryption, personnel restrictions, and control overlays Technical
Skills: - Proficiency with tools like Crowd Strike, Palo Alto, F5, Splunk/ELK, and IAM platforms (Okta, Entra , etc.).
- Strong…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).