VP, Staff Endpoint Security Engineer

SynchronyCincinnati, OH
7dHybrid

About The Position

The VP, Staff Endpoint Security Engineer, will be part of the company’s wide endpoint security program that safeguards the organization’s systems, networks, and data. Skilled and proactive Security Engineer with expertise in Endpoint Detection and Response (EDR), Application Experience Monitoring (AEM), File Integrity Monitoring (FIM), and IT Operations Management (ITOM). This role ensures operational and technical stewardship over a portfolio of Information Security services, driving Operational Excellence across all capabilities within the domain. The VP will also serve as a trusted advisor and collaborator to peers, executive leadership, and stakeholders throughout the organization. Our Way of Working We’re proud to offer you flexibility. At Synchrony, our way of working allows you to have the option to work from home near one of our Hubs or come into one of our offices. Occasionally you will be required to commute or travel for in person engagement activities such as business or team meetings, training and culture events. Field Sales and some Commercial team roles may have varied location requirements based upon partner obligations or preferences.

Requirements

  • Bachelor of Science in Computer Science, Engineering, or a related field with at least 3 years of relevant technology experience, or High School Diploma/GED with a minimum of 5 years’ technology experience, including at least 2 years in Information Security or related roles.
  • Proven excellence in devising holistic security directions and strategies that encompass a wide range of technical and organizational considerations.
  • Outstanding interpersonal and collaboration skills demonstrated consistent and successful collaboration across teams on cross-functional security initiatives.
  • Demonstrated ability to solve complex and intricate security problems that demand innovative solutions.
  • Notable technical leader with demonstrated effective communication and influence at all levels across the organization.
  • Highly regarded as a subject matter expert with deep knowledge of the enterprise technology stack.
  • Recognized for their ability to teach, mentor, grow, and provide advice to other domain experts and individual contributors
  • Strong ability to adapt to evolving circumstances, technologies, and strategic priorities, while leading complex initiatives
  • Demonstrate strong conflict management abilities within high-impact initiatives
  • Proven experience in managing and supporting EDR, AEM, FIM, and ITOM systems.
  • Strong knowledge of endpoint security technologies, network security principles, and monitoring tools.
  • Experience with security incident detection and response processes.
  • Ability and flexibility to travel for business as required

Nice To Haves

  • Strong engineering and/or architecture background with hands-on experience designing, building, and managing cybersecurity solutions.
  • In-depth understanding of information security practices, policies, risk management, and threat landscapes.
  • Proficiency in modern programming/scripting languages, especially Python.
  • Familiarity with public cloud platforms (e.g., AWS, Azure, GCP) from both infrastructure and development perspectives.
  • Experience with operational disciplines including incident management, problem management, change management, and system monitoring.
  • Exceptional problem-solving and analytical skills, with a creative and independent mindset while thriving in team environments.
  • Ability to prioritize and deliver under pressure across multiple simultaneous projects.
  • Strong verbal and written communication skills with a collaborative approach.
  • Leadership experience with a track record of mentoring technical teams and influencing cross-functional stakeholders.

Responsibilities

  • Champion Operational Excellence by identifying efficiencies and synergies through automation, collaboration, and orchestration.
  • Identify operational problems and clearly articulate well-founded solutions and recommendations.
  • Collaborate with architecture and engineering teams to identify capability gaps, define requirements, develop solutions, and support proof-of-concept testing.
  • Partner with peers to prioritize workloads effectively using agile processes, ensuring timely escalation of risks, impediments, and requests leadership.
  • Design, implement, and maintain metrics (e.g., alerting, monitoring) to measure and report on adherence to service SLAs/SLOs, performance, and operational efficiency.
  • Manage and evolve technology solutions end-to-end, identifying gaps and overlaps within the tech stack and coordinating cross-technology integration.
  • Lead root cause analysis initiatives to reduce downtime, enhance resiliency, and cultivate a culture of continuous improvement.
  • Drive incident response progress and resolve support escalation cases efficiently.
  • Establish and communicate platform health reporting, dashboards, and key operational indicators.
  • Provide day-to-day operational support for security tools and processes, ensuring superior customer service and identifying process improvements.
  • Mentor team members and act as a subject-matter expert across the Information Security organization.
  • Deploy, configure, and manage Endpoint Detection and Response (EDR) solutions to continuously monitor and respond to threats on endpoints across the enterprise.
  • Analyze security alerts and conduct threat hunting activities to identify potential incidents.
  • Collaborate with incident response teams for containment, eradication, and recovery.
  • Implement and maintain Application Experience Monitoring (AEM) tools to monitor application performance and security-related metrics.
  • Correlate application data with security events to identify anomalous behaviors that may indicate security threats.
  • Configure and manage File Integrity Monitoring (FIM) solutions to detect unauthorized changes to critical system and application files.
  • Develop and maintain baselines and alerting criteria for integrity monitoring.
  • Support IT Operations Management (ITOM) platforms and processes that integrate security controls with operational workflows.
  • Work with cross-functional teams to automate security operations and incident handling.
  • Perform additional duties and special projects assigned.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service