Senior Principal Cybersecurity Engineer; Incident Response
Listed on 2026-03-04
-
IT/Tech
Cybersecurity, Data Security
Senior Principal Cybersecurity Engineer Details
Location:
Arlington, TX 76014 (M-Th onsite / non-negotiable)
Position Type:
Direct-Hire
Hourly / Salary: to $230K + 15% annual bonus
Vaco is currently seeking a Senior Principal Cybersecurity Engineer for a Direct-Hire opportunity that is located in Arlington, TX 76014 (M-Th onsite / non-negotiable). The Senior Principal Cybersecurity Engineer will join the Incident Response Team as a technical leader and SME, influencing the achievement of strategic alignment by partnering with business unit leaders to identify high-impact initiatives that advance business strategy.
The Senior Principal Cybersecurity Engineer will provide leadership and influence to promote process improvement and drive productivity and performance across the enterprise. The Senior Principal Cybersecurity Engineer will be recognized as a leader internally and externally and will represent the organization within the broader community, serving as an unofficial ambassador and maintaining strong professional relationships.
- Incident Response Operations – Actively Participate in Incident Investigations Across Detection / Containment / Eradication / Recovery / Post-Incident Reviews
- IR Tooling / Automation – Develop / Enhance Incident Response Tools / Scripts / Frameworks | Improving Detection / Response / Investigation Efficiency, Accuracy, and Scalability
- Forensics / Malware Analysis – Conduct and Enhance Memory / Network / Host / Cloud Forensics | Malware Reverse-Engineering | Automated Triage Capabilities
- Remediation Planning – Create Customized Tactical / Strategic Remediation Plans for Alerts / Incidents Identified Internally and in the Wild Across the GMF Landscape
- Incident Reporting – Convey Analytical Findings via Clear / Finished Technical Reports Following Resolution
- Threat Intelligence Enablement – Identify / Codify Attacker TTPs / IOCs | Feed Intelligence into Detection Pipelines / Incident Response Playbooks
- Security Exposure Analysis – Gather / Analyze Cybersecurity Data / Security Tool Outputs / Risk Systems | Identifying Security Exposures and Control Gaps
- Threat Simulation / Readiness – Lead and/or Participate in Tabletop Exercises / Purple Team Sessions / Threat Fencing Simulations
- Log / Alert Analysis – Perform Analysis Across SIEM Alerts / IDS / IPS / Host Telemetry / Network Traffic | Identifying Suspicious / Anomalous Activity
- Threat Landscape Monitoring – Proactively Stay Ahead of Emerging Threats (Zero-Days / Vulnerabilities / Advanced Persistent Threats)
- Senior Principal Cybersecurity Engineer / Incident Response – Conducting / Managing Incident Response Investigations | Targeted Threats (Advanced Persistent Threats / Organized Crime / Hacktivists)
- Threat Intelligence / Detection – Applying Threat Intelligence Techniques / Detection Rules / Forensic Analysis Tools to Determine Scope / Impact During Incident Response Investigations
- Forensics Expertise – Leading Complex / High-Severity Investigations | Network / Endpoint / Memory / Disk / Cloud Forensics
- Threat Hunting – Develop / Implement Risk-Based / Threat-Led Hunting Methodologies
- Adversary Tradecraft (working knowledge) – Global Cyber Threats / Threat Actors / Adversary TTPs / IOCs | MITRE ATT&CK / RE&ACT Frameworks (familiarity)
- Cloud Incident Response (strong understanding) – Cloud IR on Azure / AWS Platforms | Logging / Monitoring / Telemetry Enablement
- Case Management – Managing Incidents End-to-End | Workflow Adherence / Stakeholder Communication / Evidence Collection
- NIST Incident Response – Operating Within NIST Incident Response
- Scripting / Automation – Python / Power Shell / Bash | Build / Enhance Incident Response Capabilities (Writing Modular Code Deployable to Remote Systems)
- Advanced Scripting Stack – Python / Power Shell / Bash / Jupyter / Anaconda for Automation / Analysis / IR Tooling
- API Development – Designing / Constructing / Testing APIs to Support Security Automation / Integration
- CI/CD / Detection-as-Code (advanced) – CI/CD Practices / Detection-as-Code Methodologies for Scalable / Repeatable Security Operations
- Network Analysis Tooling – Bro/Zeek / Suricata / Splunk SPL with…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).