Senior Security Engineer

Red Cup IT, Inc.Los Angeles, CA

About The Position

The role of a Senior Security Engineer in 2026 has evolved from a traditional "firewall gatekeeper" into a strategic architect and automation expert. With the rise of AI-driven threats and the death of the traditional network perimeter, this role now focuses heavily on Zero Trust, Cloud Sovereignty, and DevSecOps integration. A Senior Security Engineer is responsible for designing, building, and maintaining the systems that protect an organization's digital assets. Unlike junior roles that focus on monitoring, the "Senior" level requires leading large-scale architecture projects, mentoring junior staff, and automating security responses to keep pace with AI-speed attacks.

Requirements

  • Identity & Access Management (IAM), Infrastructure as Code (Terraform, Bicep), Cloud-Native SIEM.
  • Proficiency in Python, Go, or Rust for building custom security tooling and automation.
  • Deep knowledge of Zero Trust Network Access (ZTNA), BGP, and Software-Defined Perimeter (SDP).
  • Expertise in SOAR (Security Orchestration, Automation, and Response) and XDR platforms.
  • Knowledge of quantum-resistant algorithms and digital provenance protocols.
  • Typically 5–10+ years in cybersecurity or high-level systems engineering.
  • Bachelor’s or Master’s in Computer Science, Cybersecurity, or a related field.

Nice To Haves

  • CISSP: Certified Information Systems Security Professional
  • OSCP / OSCE: Offensive Security certifications
  • CCSP / AWS Certified Security
  • CASE: Certified Application Security Engineer

Responsibilities

  • Architecting end-to-end security solutions for multi-cloud environments (AWS, Azure, GCP) and hybrid infrastructures.
  • Embedding automated security scanning (SAST/DAST) into CI/CD pipelines so security is "baked in" rather than "bolted on."
  • Serving as the technical lead during high-severity security incidents and conducting advanced digital forensics.
  • Implementing guardrails for internal AI models and defending against AI-powered social engineering and deepfakes.
  • Managing complex, risk-based vulnerability programs that prioritize threats based on actual business impact rather than just "high" CVSS scores.
  • Ensuring technical controls align with evolving global regulations like GDPR, NIST 800-53, and newer cloud sovereignty laws.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service