← Serch more jobs

Principal Security Engineer

LinkedIn ICW Group San Diego, CA
Not Applicable Posted April 1, 2026 Job link
Thinking about this job
Not Met Priorities
What still needs stronger evidence
Requirements
  • Minimum 10+ years of cybersecurity experience, including 6+ years in Security Operations and Incident Response.
  • Minimum 3+ years leading technical security teams.
  • Deep expertise in SIEM and SOAR engineering.
  • Strong hands‑on incident response background, including forensics, containment, and executive communications.
  • Proven experience in vulnerability management and threat hunting.
  • Cloud security experience in AWS and Azure.
  • Understanding of Property & Casualty insurance platforms and regulatory obligations.
  • Experience using large language models for alert triage, automated summarization, and signal classification.
  • Hands‑on or leadership experience with behavioral AI and NDR platforms (e.g., Darktrace).
  • Use of machine‑learning‑driven detection techniques such as UEBA, anomaly scoring, and clustering.
  • AI‑assisted detection engineering, including threat‑intelligence pattern extraction and rule or code generation.
  • Establishing AI governance and safe‑use patterns, including prompt controls, data redaction, and hallucination mitigation.
  • Integrating Snowflake data pipelines with ML engines for predictive risk scoring and incident correlation.
  • Applying AI to vulnerability triage, exploit likelihood prediction, and remediation pattern identification.
  • Data Platforms: Snowflake, Event Hubs, Data Lakes
  • Network: Palo Alto Networks firewalls, Prisma Access
  • DSPM / DLP: BigID, Purview, Symantec
  • Email Security: Proofpoint, Mimecast
  • Requires manual and finger dexterity and eye-hand coordination.
  • Requires normal or corrected vision and hearing corrected to a normal range.
  • This position operates in an office environment and requires the frequent use of a computer, telephone, copier, and other standard office equipment.
Preferred Skills
  • Preferred Qualifications – Ai‑driven Security Operations
  • Experience using large language models for alert triage, automated summarization, and signal classification.
  • Hands‑on or leadership experience with behavioral AI and NDR platforms (e.g., Darktrace).
  • Use of machine‑learning‑driven detection techniques such as UEBA, anomaly scoring, and clustering.
  • AI‑assisted detection engineering, including threat‑intelligence pattern extraction and rule or code generation.
  • Integrating Snowflake data pipelines with ML engines for predictive risk scoring and incident correlation.
  • Applying AI to vulnerability triage, exploit likelihood prediction, and remediation pattern identification.
  • Preferred Certifications
  • GIAC (GCIA, GCFA, GCTI, GREM), CISSP, CCSP
  • AWS or Azure Security Specialty
  • Machine Learning or AI engineering exposure strongly preferred
  • Skills & Tools
  • Security Analytics & Operations
  • SIEM / SOAR: Splunk, Microsoft Sentinel, Rapid7 SOAR, Cortex XSOAR
  • EDR / XDR: CrowdStrike Falcon, Microsoft Defender, Palo Alto Cortex XDR
  • NDR / AI Security: Darktrace (preferred), Zeek, Suricata
  • Cloud, Data & Network
  • Cloud Security: AWS GuardDuty, AWS Security Hub, Azure Defender
  • Data Platforms: Snowflake, Event Hubs, Data Lakes
  • Network: Palo Alto Networks firewalls, Prisma Access
  • Data Protection & Messaging
  • DSPM / DLP: BigID, Purview, Symantec
  • Email Security: Proofpoint, Mimecast
Education
  • (Required) – Bachelor’s Degree in Computer Science, IT, or similar field required.
  • (Not required) – Preferred Qualifications – Ai‑driven Security Operations
  • (Not required) – Machine Learning or AI engineering exposure strongly preferred