via Oraclecloud
$142K - 252K a year
Lead cyber threat intelligence efforts by analyzing threats, mentoring teams, collaborating with security operations, and informing executive risk decisions.
Bachelor's degree, 8+ years in cyber threat intelligence, CISSP/CEH certification, healthcare security experience, and expertise in threat analysis frameworks.
Providence caregivers are not simply valued – they’re invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them. Providence is looking for a seasoned Principal Security Engineer with deep expertise in Cyber Threat Intelligence. In this pivotal role, you’ll be the strategic force behind identifying and neutralizing emerging threats, safeguarding critical systems, and empowering Providence’s Global Security Operations Center. Your insights will directly inform risk strategies and guide executive decision-making—making you a key player in protecting millions of lives through secure healthcare technology. If you’re passionate about staying ahead of adversaries and driving innovation in cybersecurity, this is your chance to lead at the highest level. Providence offers hybrid work options for candidates living within a daily commuting distance—up to 65 miles—from any of our primary office locations listed below. Washington: Seattle, Redmond, Renton, Vancouver California: Los Angeles, Irvine Oregon: Portland Please note the following important details regarding this position: This role requires flexibility to participate in a rotational on-call schedule to maintain system availability and troubleshoot critical issues outside of regular hours. This is a hybrid role, involving a combination of in-office and remote work each week. The weekly hybrid schedule will be determined by the manager based on departmental needs. Essential Functions: Conduct in-depth analysis and research on cyber threats, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the organization. Prepare and deliver well researched, impactful analytic findings that combine self-driven research and findings from team threat hunting efforts to convey cyber threat risk and impact, tailored appropriately to technical and non-technical stakeholders, including executives Serve as a mentor to teammates for leveraging advanced analytic toolsets such as Structured Analytic Techniques Ability to classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK Maintain strong breadth and depth of knowledge about the healthcare industry threat landscape, including threat actors, malware, hacking techniques, emerging threats, and trends that may impact the organization Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations. Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions. Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense. Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations. Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis. Required Qualifications: Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education / experience Upon Hire: CISSP, CEH, or an equivalent certification 8 or more years of related experience Experience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks. Preferred Qualifications: Master's Degree in Computer Engineering, Computer Science, Mathematics, Engineering Experience in a Healthcare environment 8 or more years of cyber threat intelligence analysis experience Experience conducting in-depth analysis and research on cyber threats, including identifying threat actors' motivations, intent, and TTPs Skilled in correlating intelligence from multiple sources to assess potential organizational impact Familiarity with reverse engineering and categorizing malware Strong knowledge of healthcare cybersecurity risks, including ransomware, phishing, and supply chain vulnerabilities Demonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain, Diamond Model of Intrusion Analysis, others Experience working cross-functionally with CIRT/IR teams, vulnerability management, and SOC operations teams. Experience working with insider threat teams a plus Capability to develop threat profiles and integrate tactical intelligence into detection rules Ability to influence risk-based decision-making with clear, concise reporting Salary Range by Location: California: Los Angeles and Irvine: Min: $71.23, Max: $121.29 Oregon: Portland Service Area: Min: $68.33, Max: $116.36 Washington: Seattle, Renton, Redmond: Min: $71.23, Max: $121.29 Washington: Vancouver: Min: $68.33, Max: $116.36 Why Join Providence? Our best-in-class benefits are uniquely designed to support you and your family in staying well, growing professionally, and achieving financial security. We take care of you, so you can focus on delivering our Mission of caring for everyone, especially the most vulnerable in our communities.
This job posting was last updated on 12/5/2025