×
Register Here to Apply for Jobs or Post Jobs. X

Software Engineer, Information Security - Managed File Transfer Security Transformation

Job in Bentonville, Benton County, Arkansas, 72712, USA
Listing for: Walmart
Full Time position
Listed on 2026-02-28
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Data Security, Cloud Computing
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Staff, Software Engineer, Information Security - Managed File Transfer Security Transformation

Position Summary...

We are seeking a highly experienced and forward-thinking Staff, Systems and Infrastructure Engineer to lead the security transformation of our enterprise Managed File Transfer (MFT) platform. This role will serve as a technical authority in secure file transfer architecture, SSH authentication modernization, and enterprise data protection strategies.

As a key member of the team, you will lead the evolution of our MFT ecosystem — including the strategic transition from SSH key-based authentication to SSH certificate-based authentication — while strengthening data security, cryptographic hygiene, and operational resilience across the enterprise.

This is a transformational role focused on modernization, automation, and security-first design.

What you'll do... MFT Architecture & Modernization
  • Serve as the subject matter expert (SME) for Managed File Transfer platforms (e.g., SFTP, FTPS, HTTPS-based transfers, enterprise MFT solutions).
  • Define and drive the strategic roadmap for modernizing MFT authentication and authorization models.
  • Lead the transition from static SSH key-based authentication to SSH certificate-based authentication at enterprise scale.
  • Establish architectural standards and patterns for secure file movement across internal, cloud, and third‑party environments.
  • Provide technical leadership for high‑availability, scalable, and secure MFT infrastructure.
SSH & Authentication Strategy
  • Design and implement SSH certificate authority (CA) architecture and lifecycle management processes.
  • Develop automation frameworks for SSH key and certificate provisioning, rotation, revocation, and auditing.
  • Reduce risk associated with unmanaged or orphaned SSH keys through governance, discovery, and remediation programs.
  • Integrate SSH certificate-based authentication into CI/CD pipelines and automated workloads.
  • Collaborate with Identity & Access Management (IAM) teams to align MFT authentication with enterprise identity strategies.
Data Security & Cryptography
  • Ensure secure configuration and hardening of secure transport protocols (SSH, TLS, etc.).
  • Provide guidance on cryptographic standards, cipher selection, and protocol configurations.
  • Assess and mitigate risks related to data‑in‑transit, key management, and machine‑to‑machine authentication.
  • Partner with security architecture teams to align MFT solutions with enterprise security controls and regulatory requirements.
  • Stay current on emerging security threats and evolving best practices in secure file transfer and cryptographic authentication.
Governance, Risk & Operational Excellence
  • Define security guardrails, policies, and best practices for onboarding partners and internal application teams to MFT platforms.
  • Lead security reviews, threat modeling exercises, and risk assessments for file transfer workflows.
  • Improve observability, logging, and monitoring for anomalous file transfer and authentication activity.
  • Develop metrics and reporting to measure authentication hygiene and modernization progress.
  • Mentor engineers and elevate the overall security maturity of the MFT organization.
Qualifications
  • Deep expertise in Managed File Transfer technologies and secure file transfer protocols (SFTP, FTPS, SCP, HTTPS, etc.).
  • Advanced knowledge of SSH authentication mechanisms, including:
    • SSH key generation and management
    • Key rotation strategies
    • Key governance challenges
    • SSH certificate‑based authentication design and implementation
  • Strong understanding of Public Key Infrastructure (PKI), certificate authorities, and certificate lifecycle management.
  • Experience designing secure machine‑to‑machine authentication models at scale.
  • Strong knowledge of encryption, data‑in‑transit protection, and secure protocol configuration.
  • Experience automating infrastructure and security controls using scripting or infrastructure‑as‑code tools.
  • Ability to design scalable, resilient, and highly available infrastructure solutions.
  • Strong analytical and problem‑solving skills.
  • Excellent communication skills with the ability to influence both technical and non‑technical stakeholders.
  • Proven ability to lead cross‑functional initiatives in complex enterprise environments.
Preferred Qualifications
  • Exp…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary