Algorithms, Amazon Web Services (AWS), Artificial Intelligence (AI), Automation, BGP, CISSP - Certified Information Systems Security Professional, Cloud Computing, Computer Forensics, Computer Science, Computer Security, Continuous Deployment/Delivery, Continuous Integration, Cryptography, Establish Priorities, GCP (Good Clinical Practices), Go Programming Language (Golang), Identity Data Management, Industry Standards, Internet Security, Leadership, Machine Tool, Mentoring, Microsoft Windows Azure, Python Programming/Scripting Language, Regulations, Risk Management, Security Architecture, Security Design, Security Information and Event Management (SIEM), Social Engineering, Systems Engineering, Systems Maintenance, Technical Leadership, Testing, U.S. National Institute of Standards and Technology (NIST)
LOCATION
Los Angeles, CA
POSTED
30+ days ago
The role of a Senior Security Engineer in 2026 has evolved from a traditional "firewall gatekeeper" into a strategic architect and automation expert. With the rise of AI-driven threats and the death of the traditional network perimeter, this role now focuses heavily on Zero Trust, Cloud Sovereignty, and DevSecOps integration.
Role Overview
A Senior Security Engineer is responsible for designing, building, and maintaining the systems that protect an organization's digital assets. Unlike junior roles that focus on monitoring, the "Senior" level requires leading large-scale architecture projects, mentoring junior staff, and automating security responses to keep pace with AI-speed attacks.
Key Responsibilities
Security Architecture & Design: Architecting end-to-end security solutions for multi-cloud environments (AWS, Azure, GCP) and hybrid infrastructures.
Automation & DevSecOps: Embedding automated security scanning (SAST/DAST) into CI/CD pipelines so security is "baked in" rather than "bolted on."
Incident Leadership: Serving as the technical lead during high-severity security incidents and conducting advanced digital forensics.
AI Security Governance: Implementing guardrails for internal AI models and defending against AI-powered social engineering and deepfakes.
Vulnerability Management: Managing complex, risk-based vulnerability programs that prioritize threats based on actual business impact rather than just "high" CVSS scores.
Compliance & Data Sovereignty: Ensuring technical controls align with evolving global regulations like GDPR, NIST 800-53, and newer cloud sovereignty laws.