applinity

Security Engineer, Access Risk Intelligence and Security Mitigation

at Google

Location

New York, NY, USA

Compensation

$123k–$174k USD

Type

full time

Posted

2 weeks ago

Tailor your résumé to this role in 30 seconds.

Free account · ATS keyword check · per-job bullet rewrite by Claude.

Tailor my résuméApply on company site

Job description

Our Security team works to create and maintain the safest operating environment for Google's users and developers. Security Engineers work with network equipment and actively monitor our systems for attacks and intrusions. In this role, you will also work with software engineers to proactively identify and fix security flaws and vulnerabilities.

The Proactive Access Risk Intelligence and Security Mitigations (PRISM) team is part of the Access Security team organization. The PRISM team focuses on uncovering broad risks across the access landscape, gathering and distilling access intelligence from internal systems to fortify security, and deploying comprehensive measures to ensure every angle of access is understood and protected, including enforcing security invariants to prevent future regressions. The team also has recently expanded its focus into building the next-generation taxonomy for qualifying access risk, prototyping pipelines to uncover security risks associated with agentic identifies, and architecting secure-by-default solutions scaled across the enterprise.

PRISM is the central engineering team responsible for the reduction of production infrastructure access abuse risks, which is driven through the collection of INTACT programs, including User Data Protection (UDP), AI Model Oversight, Access and Tooling (MOAT), Malicious Outages (MalOut) and Trusted Core Access (TCA).

As a Security Engineer, you will work on security research and risk mitigation systems, help scope security problems, and contribute to projects within PSS and across product areas to transform how Google manages and eliminates internal access risk.

The US base salary range for this full-time position is $123,000-$174,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.

Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.

Responsibilities

  • Drive the strategy for PRISM’s core pillars by identifying emerging access risks and designing technical solutions to mitigate them.
  • Architect and evolve security risk mitigation systems to enable continuous, automated assessment and remediation across Google’s infrastructure.
  • Serve as a technical consultant for security challenges, guiding teams across product areas to implement security invariants.
  • Contribute to and lead technical execution for the Internal Access Control (INTACT) program suite, including Privilege Access Management (PAM), ModelOversight, Access-Control and Tooling (MOAT), and Infrastructure Existential Threats (IET).

Minimum qualifications:

  • Bachelor's degree or equivalent practical experience.
  • 1 year of experience with security assessments or security design reviews or threat modeling.
  • 1 year of coding experience in one or more general purpose languages.
  • Experience with security engineering, computer and network security and security protocols.

Preferred qualifications:

  • Experience performing threat modeling for distributed systems and conducting attack path modeling and simulation to identify non-obvious lateral movement and indirect access risks.
  • Experience building or managing security posture management frameworks that provide continuous visibility and automated governance over infrastructure risks.
  • Knowledge of identity and access management (IAM), mandatory access control, principle of least privilege, and zero-trust architectures in production environments.
  • Knowledge of system hardening techniques to enforce security invariants and reduce the attack surface of critical production services.
  • Ability to use access intelligence, distilling data from internal systems to identify anomalies and prioritize high-risk remediation efforts.