Description
Providence caregivers are not simply valued - they're invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them.
Providence Health is seeking a Senior Principal Security Engineer with a threat hunting and cyber threat intelligence background. You will play a crucial role on the Cyber Threat Intelligence team and in our cybersecurity strategy, leveraging deep threat hunting expertise to lead CTI's efforts in tracking, identifying, analyzing, and mitigating emerging threats targeting our healthcare infrastructure. You will also play a key role in articulating the threat landscape to senior leadership and in support of Providence's Threat Detection and Response operations, informing risk and executive leadership decision-making.
Providence offers hybrid work options for candidates living within a daily commuting distance -up to 65 miles-from any of our primary office locations listed below.
Washington: Seattle, Redmond, Renton, Vancouver
California: Los Angeles, Irvine
Oregon: Portland
Please note the following important details regarding this position:
This role requires flexibility to participate in a rotational on-call schedule to maintain system availability and troubleshoot critical issues outside of regular hours.
This is a hybrid role, involving a combination of in-office and remote work each week.
The weekly hybrid schedule will be determined by the manager based on departmental needs.
Essential Functions:
Lead advanced threat hunting initiatives, developing frameworks and methodologies for the team's hunting and detection efforts.
Foster a culture of learning and development within the team by sharing threat hunting expertise.
Communicate and document hunting methodologies and findings to aid in development of metrics, and present findings and insights to technical and non-technical stakeholders, including executives, to enhance overall cyber threat and risk awareness.
Classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK.
Monitor and assess the healthcare industry threat landscape, including adversaries and their targets, malware, TTPs, emerging threats, and trends that may impact the organization.
Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions.
Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives.
Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations.
Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis.
Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense.
Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations.
Required Qualifications:
Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education and experience
Upon hire: CISSP, CISM, CEH, or equivalent
10 or more years of related experience
Experience performing in an Incident Commander role for cyber incidents and issues affecting business operations across the environment and drive resolution of those issues.
In depth ex