Job Description
Providence caregivers are not simply valued – they’re invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them.
Providence is looking for a seasoned Principal Security Engineer with deep expertise in Cyber Threat Intelligence. In this pivotal role, you’ll be the strategic force behind identifying and neutralizing emerging threats, safeguarding critical systems, and empowering Providence’s Global Security Operations Center. Your insights will directly inform risk strategies and guide executive decision-making—making you a key player in protecting millions of lives through secure healthcare technology. If you’re passionate about staying ahead of adversaries and driving innovation in cybersecurity, this is your chance to lead at the highest level.
Providence offers hybrid work options for candidates living within a daily commuting distance—up to 65 miles—from any of our primary office locations listed below.
Washington: Seattle, Redmond, Renton, VancouverCalifornia: Los Angeles, IrvineOregon: PortlandMontana: Great FallsMontana Except Great FallsPlease note the following important details regarding this position:
This is a hybrid role, involving a combination of in-office and remote work each week.The weekly hybrid schedule will be determined by the manager based on departmental needs.Essential Functions:
Conduct in-depth analysis and research on cyber threats, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the organization.Prepare and deliver well researched, impactful analytic findings that combine self-driven research and findings from team threat hunting efforts to convey cyber threat risk and impact, tailored appropriately to technical and non-technical stakeholders, including executivesServe as a mentor to teammates for leveraging advanced analytic toolsets such as Structured Analytic TechniquesAbility to classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CKMaintain strong breadth and depth of knowledge about the healthcare industry threat landscape, including threat actors, malware, hacking techniques, emerging threats, and trends that may impact the organizationCollaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiativesDevelop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations.Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions.Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense.Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations.Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis.Required Qualifications:
Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education / experienceUpon Hire: CISSP, CEH, or an equivalent certification8 or more years of related experienceExperience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks.Preferred Qualifications:
Master's Degree in Computer Engineering, Computer Science, Mathematics, EngineeringExperience in a Healthcare environment8 or more years of cyber threat intelligence analysis experienceExperience conducting in-depth analysis and research on cyber threats, including identifying threat actors' motivations, intent, and TTPsSkilled in correlating intelligence from multiple sources to assess potential organizational impactFamiliarity with reverse engineering and categorizing malwareStrong knowledge of healthcare cybersecurity risks, including ransomware, phishing, and supply chain vulnerabilitiesDemonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain, Diamond Model of Intrusion Analysis, othersExperience working cross-functionally with CIRT/IR teams, vulnerability management, and SOC operations teams.Experience working with insider threat teams a plusCapability to develop threat profiles and integrate tactical intelligence into detection rulesAbility to influence risk-based decision-making with clear, concise reportingSalary Range by Location:
California: Los Angeles and Irvine: Min: $71.23, Max: $121.29Oregon: Portland Service Area: Min: $68.33, Max: $116.36Washington: Seattle, Renton, Redmond: Min: $71.23, Max: $121.29Washington: Vancouver: Min: $68.33, Max: $116.36Montana: Great Falls: Min: $55.12, Max: $88.75Montana Except Great Falls: Min: $55.01, Max: $93.68Why Join Providence?
Our best-in-class benefits are uniquely designed to support you and your family in staying well, growing professionally, and achieving financial security. We take care of you, so you can focus on delivering our Mission of caring for everyone, especially the most vulnerable in our communities.
Apply for this Position
Ready to join ? Click the button below to submit your application.
Submit Application