Cybersecurity Senior Engineer - Non Human Identity (Remote)

The Home Depot
1d$120,000 - $180,000Remote

About The Position

With a career at The Home Depot, you can be yourself and also be part of something bigger. Position Purpose: The Senior Cybersecurity Engineer – Non‑Human Identity (NHI) partners with Architecture, IAM, cloud, platform, DevOps, and application teams to design, build, and operate enterprise‑scale discovery, governance, and lifecycle automation for non‑human identities (NHIs). NHIs include service accounts, API tokens, cloud IAM roles, automation identities, CI/CD identities, and AI agents across on‑premises, hybrid, and multi‑cloud environments. This role focuses on automation, collaboration, and risk reduction, helping modernize authentication patterns and reduce reliance on long‑lived credentials.

Requirements

  • Must be eighteen years of age or older.
  • Must be legally permitted to work in the United States.
  • The knowledge, skills and abilities typically acquired through the completion of a high school diploma and/or GED.

Nice To Haves

  • Non‑Human Identity Discovery & Automation Work with IAM, Architecture, and platform teams to design and operate automated discovery capabilities for NHIs across servers, applications, cloud platforms, and CI/CD pipelines
  • Contribute to development of automation and tooling (Python, PowerShell) to: Discover NHIs across infrastructure and environments Parse configuration files, logs, APIs, and Infrastructure‑as‑Code to identify embedded or hard‑coded credentials Enrich NHI metadata including ownership, purpose, environment, and lifecycle state Partner with engineering teams to automate NHI hygiene activities such as ownership validation, lifecycle tracking, and reporting
  • NHI Lifecycle & Governance Collaborate with IAM, Architecture, cloud, and ITSM teams to design and integrate NHI lifecycle workflows, including onboarding, access reviews, credential rotation, and decommissioning
  • Integrate NHI workflows with enterprise platforms, including: IAM and PAM solutions, Cloud IAM services, Secrets management platforms, ITSM and workflow tools
  • Support enforcement of clear ownership, purpose, and lifecycle accountability for NHIs
  • Assist with enterprise access reviews, attestations, and audit evidence generation
  • Partner with application, platform, and DevOps teams to analyze authentication flows and refactor legacy patterns toward modern, password‑less NHI designs, including managed identities, OAuth client credentials, and short‑lived tokens.
  • Provide NHI context to security monitoring and incident response teams to support investigations involving service account misuse, anomalous automation behavior, or credential compromise
  • Apply data‑driven techniques such as pattern recognition, baselining, and anomaly indicators to analyze NHI usage trends and detect drift or misuse.
  • AI Agent Identity Governance Partner with architecture and platform teams to support onboarding and governance of AI agents as non-human identities
  • Help ensure AI agents have clearly defined ownership, scoped access, and documented lifecycle expectations
  • Basic PKI Responsibilities (Foundational) Support certificate‑based NHIs (e.g., TLS, mTLS, client authentication) as part of broader NHI governance
  • Integrate NHI discovery and lifecycle workflows with enterprise PKI and certificate management platforms
  • Ensure certificates and private keys follow approved standards for issuance, rotation, and expiration, without direct ownership of PKI infrastructure
  • Collaborate across security, cloud, and platform engineering teams to align NHI controls with Zero Trust principles and THD security standards.
  • Produce and maintain technical documentation, runbooks, and onboarding guides, and support audit and compliance activities through NHI evidence and reporting.
  • Continuously improve the NHI program by identifying automation opportunities, reducing operational toil, and improving accuracy, coverage, and maturity of non‑human identity controls.

Responsibilities

  • Deliver Execution, Plans & Align, Problem Solving - Design automation workflows and capabilities in support of data collection, investigation and incident response
  • Develop threat hunting and data analysis strategy and capabilities
  • Identify and propose new technologies, methodologies and/or approaches to detecting malicious activity
  • Utilize indicators to scope and respond proactively to emerging threats
  • Design, build, configure, maintain and monitor cybersecurity threat defense capabilities and user access management

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

High school or GED

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service