Home Depot Cybersecurity Principal-Architect – Endpoint Security in Austin, Texas
Within the walls of The Home Depot, you'll find empowered associates who ideate, build, and implement innovative solutions for the world's largest home improvement retailer.
The Cybersecurity Principal for Endpoint Security is responsible for defining and leading innovative endpoint security solutions and sourcing new technologies to protect our associates and millions of customers across the nation.
The Principal for Endpoint Security is a member of the Cybersecurity Architecture and Innovation group. This role works with the architecture and infrastructure teams on the design, engineering, and implementation of technology solutions and methodologies to ensure secure deployment. This person will act as the face of the Endpoint Security Architecture group to other areas of the organization and work closely with senior leadership on new initiatives. This role requires expert level knowledge of the risk and endpoint security landscape to be able to better propose impactful security solutions.
Let's change the future of retail together.
MAJOR TASKS, RESPONSIBILITIES AND KEY ACCOUNTABILITIES
40% - Strategy & Planning:
Researches and analyzes business trends and behavioral data to identify opportunities for improvements and new initiatives
Leads the evaluation, development, and recommendation of specific technology products and platforms to provide cost-effective solutions that meet business and technology requirements
Researches and designs best fit infrastructure, network, database, and security architectures for products
Guides the proactive creation and maintenance of tools for monitoring and support
Leads project budgeting, planning, and management across multiple efforts and teams
Develops and delivers formal training courses
Visits with operational units (e.g., warehouses, stores, data centers) to understand needs and build relationships
20% - Delivery & Execution:
Guides configuration, debugging, and support for infrastructure
Documents, reviews and ensures that all quality and change control standards are met
Guides field and corporate roll-outs of technology
Guides the stand up of necessary system software, hardware, and equipment (physical or virtual) to meet changing infrastructure needs
Creates and optimizes specifications for complex technology solutions
Produces and manages purchase requests for hardware and software
Creates technical white papers and thought leadership
Creates and enforces process standards
Leads disaster recovery planning and engineering efforts
Collaborates with other leaders to drive build versus buy decisions with regard to technology
30% - Support & Enablement:
Collaborates with product and project teams to understand needs and enable them with infrastructure
Guides technology architecture design review efforts for project and product teams
Leverages tooling and custom applications to monitor the operational status of applications, infrastructure, networks, databases and security; optimizes and tunes performance as appropriate
Guides root cause analysis, debugging, support, and post-mortem analysis for security incidents and service interruptions
Guides maintenance, upgrades, and support for existing systems and infrastructure to ensure operational stability
Acts as a vendor relationship manager
Guides the production of in-house documentation around solutions
Monitors tools and proactively helps teams struggling with systems issues
Provides application support for software running in production
Guides the creation of scripts and tools that drive automation and enable product teams and end users to move towards self service
Acts as a mentor to more junior Systems Engineers
10% - Learning:
Keeps abreast of innovations and industry trends as well as changes to internal systems and determines how they impacts tools, training, and support necessary to keep systems up, running, and secure
Participates in and contributes to learning activities around modern systems engineering core practices (communities of practice)
Leads learning efforts inside the organization focused on systems engineering
Proactively views articles, tutorials, and videos to learn about new technologies and best practices being used within other technology organizations
NATURE AND SCOPE
Typically reports to the Systems Engineer Manager or Sr. Manager, Technology Director or Sr. Director.
ENVIRONMENTAL JOB REQUIREMENTS
Located in a comfortable indoor area. Any unpleasant conditions would be infrequent and not objectionable.
Typically requires overnight travel less than 10% of the time.
Must be eighteen years of age or older.
Must be legally permitted to work in the United States.
Additional Minimum Qualifications:
Must be legally permitted to work in the United States
The knowledge, skills and abilities typically acquired through the completion of a bachelor's degree program or equivalent degree in a field of study related to the job.
Years of Relevant Work Experience: 6 years
Most of the time is spent sitting in a comfortable position and there is frequent opportunity to move about. On rare occasions there may be a need to move or lift light articles.
10+ years of relevant work experience
Proficient at developing endpoint security architectures at enterprise scale
Effective at working as part of a collaborative, cross-functional, modern architecture & engineering team
Proficient with Windows and Linux environments
Working Knowledge of GCP and Azure Cloud environments.
Cyber SME of cyber defensive architecture and technologies required to protect, detect and respond to cyber threats and attack. Technologies include SIEM, vulnerability assessment, discovery, infrastructure, host-based protection and security, etc
Extensive knowledge of information security principles and practices.
Experience installing and using various security tools, especially endpoint security tools and controls
Ability to analyze and test new solutions for security requirements related to endpoint security.
Extensive knowledge on
EndPoint Security - Antivirus, HIPS, Host Firewall (Symantec, TrendMicro, McAfee, ATP, Defender), Tripwire
EndPoint Detection and Response (EDR) & Threat Hunting - Tanium, CrowdStrike Falcon, FireEye, Carbon Black
Red Team Offensive Security - Kali Linux, Cobalt Strike, Burp Suite, Metasploit, Empire
Software Development Security - Shift left methodologies, IBM AppScan, XRay, CheckMarx Codebashing, Veracode, OWASP
Knowledge, Skills, Abilities and Competencies: Action Oriented: Taking on new opportunities and tough challenges with a sense of urgency, high energy, and enthusiasm
Business Insight: Applying knowledge of business and the marketplace to advance the organization s goals
Collaborates: Building partnerships and working collaboratively with others to meet shared objectives
Communicates Effectively: Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences
Cultivates Innovation: Creating new and better ways for the organization to be successful
Drives Results: Consistently achieving results, even under tough circumstances
Global Perspective: Taking a broad view when approaching issues; using a global lens
Interpersonal Savvy: Relating openly and comfortably with diverse groups of people
Manages Ambiguity: Operating effectively, even when things are not certain or the way forward is not clear
Manages Complexity: Making sense of complex, high quantity, and sometimes contradictory information to effectively solve problems
Nimble Learning: Actively learning through experimentation when tackling new problems, using both successes and failures as learning fodder.
Optimizes Work Processes: Knowing the most effective and efficient processes to get things done, with a focus on continuous improvement
Self-Development: Actively seeing new ways to grow and be challenged using both formal and informal development channels
Situational Adaptability: Adapting approach and demeanor in real time to match the shifting demands of different situations
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state or local protected class.