Remediation Security Engineer

Verizon Verizon · Telecom · Ashburn, VA +3

This role focuses on identifying systemic root causes of security failures within Verizon's network, codifying lessons into security guardrails, and performing threat research to identify vulnerabilities. The engineer will translate offensive intelligence into mitigation strategies, author security blueprints, and advocate for preventive controls, with a strong emphasis on verification and validation of implemented fixes.

What you'd actually do

  1. Drive Systemic Root Cause Analysis (RCA): Lead deep-dive investigations into recurring vulnerability classifications to identify systemic design flaws.
  2. Lead Investigative Threat Research & Pivoting: When a compromised asset is identified, perform technical correlation to determine if related infrastructure, subnets, or technically congruent stacks are also exposed. You will pivot from known indicators to identify secondary vulnerabilities across the network.
  3. Identify Shared Technical Vulnerabilities: Leverage external intelligence and internal data correlation to identify assets that mirror the technical configuration and exploitability of originally compromised targets, providing Defense teams with an expanded scope for remediation.
  4. Translate Offensive Intelligence: Partner with Red, Purple, and Pen Test teams to translate 100% of validated TTPs into actionable mitigation strategies mapped to the MITRE ATT&CK framework.
  5. Author Security Blueprints & Guardrails: Draft a suite of "Secure-by-Default" hardening guides and templates, using trend data to define high-end technical security standards.

Skills

Required

  • Security Intelligence
  • Technical Writing
  • Root Cause Analysis
  • Verification & Validation (V&V) processes
  • MITRE ATT&CK framework
  • pivoting
  • asset correlation
  • documenting technical workflows
  • SOP frameworks

Nice to have

  • GIAC Cyber Threat Intelligence
  • CISSP
  • CISA
  • CompTIA Security+
  • Offensive Security (Red/Purple Teaming)
  • Splunk
  • SIEM tools
  • proactive mindset
  • engineering blueprints
  • system standards

What the JD emphasized

  • security guardrails
  • Root Cause Analysis
  • Shared Technical Vulnerabilities
  • Secure-by-Default
  • Verification & Validation (V&V)