Lead Cybersecurity Engineer

Newark, CA

Lucid Motors

Lucid is the future of sustainable mobility, designing electric cars that further reimagines the driving experience.

View all jobs at Lucid Motors

Apply now Apply later

Leading the future in luxury electric and mobility At Lucid, we set out to introduce the most captivating, luxury electric vehicles that elevate the human experience and transcend the perceived limitations of space, performance, and intelligence. Vehicles that are intuitive, liberating, and designed for the future of mobility. ย  We plan to lead in this new era of luxury electric by returning to the fundamentals of great design โ€“ where every decision we make is in service of the individual and environment. Because when you are no longer bound by convention, you are free to define your own experience. ย  Come work alongside some of the most accomplished minds in the industry. Beyond providing competitive salaries, weโ€™re providing a community for innovators who want to make an immediate and significant impact. If you are driven to create a better, more sustainable future, then this is the right place for you.

Lead Cybersecurity Engineer

We are seeking a Lead Cybersecurity Engineer to join our growing Cybersecurity Team. This role is ideal for an experienced and driven professional with a strong background in end-to-end cybersecurity systems design frameworks, and managing complex data sets across infrastructure, cloud, and security tools. The ideal candidate brings a hands-on, proactive approach, excels in fast-paced environments, and demonstrates a passion for securing enterprises against a broad set of evolving cyber threats.

Key Responsibilities

ยท Define and contribute to cybersecurity requirements, design, and test specifications

ยท Develop production-quality systems that meet stringent security standards

ยท Proven experience managing cybersecurity development programs

ยท Collaborate with internal development teams to review application code and enhance security posture

ยท Clearly communicate security concepts to both technical and non-technical stakeholders

ยท Provide mentorship and technical guidance to junior team members

ยท Provide technical leadership through direct contribution and mentorship

ยท Define security requirements and develop test specifications

ยท Drive design and code reviews to ensure high standards and secure development practices

ยท Assess emerging security threats and deliver strategic recommendations

ยท Contribute to forensic investigations as needed

ยท Participate in evaluating and selecting third-party systems and service stacks

ยท Manage and communicate hardware, software, and systems dependencies with a focus on minimizing risk

Qualifications

ยท Experience designing and delivering end-to-end cybersecurity and cloud-native solutions

ยท Proven experience managing cybersecurity development programs

ยท Architected Identity and Access Management lifecycle systems

ยท Designed unified identity frameworks for B2B/B2C

ยท Consolidation of next-gen firewall and SIEM real time data into threat-analytics systems

ยท Vulnerability management system design and patch management

ยท Proficiency in Agile methodologies, including sprint planning and execution

ยท Strong theoretical foundation in cryptography

ยท Deep understanding of layered, end-to-end security principles

ยท Experience in embedded software development

ยท Familiarity with cybersecurity monitoring and analytics

ยท Ability to define, prioritize, and estimate tasks and delivery timelines

ยท Implemented Zero Trust authentication privilege

ยท Automated infrastructure provisioning with Terraform, Ansible, and scripting solutions

ยท Developed real-time breach-intelligence ingestion pipelines and AI-driven systems

ยท Created and deployed CVE/CVSS/MITRE scoring systems

ยท Produced visual topology diagrams, runbooks, and governance policies to align cross-functional teams

ยท Cybersecurity system design and architecture

ยท Security tool orchestration and integration

ยท Cloud and Infrastructure: AWS, GCP, Azure, Terraform, Kubernetes, Docker, Ansible

ยท Real-Time Threat Intelligence: Dark-Web & Breach Feeds โ†’ Data Normalization โ†’ CVE/CPE Correlation

ยท Zero Trust authentication and related custom network services

ยท Logging and monitoring: Grafana, Prometheus, Splunk, Palo Alto Networks

ยท SIEM pipeline design

ยท Working knowledge of IAM/Access, HRIS, Provisioning Engines, Directory Services, Access Management, ERP Systems

ยท Working knowledge of Security Tools such as Next-Gen Firewall, SIEM, Threat Analytics Platforms, EDR, DLP, Vulnerability Scanners

ยท Cloud and IaC: AWS, GCP, Azure, Terraform, Ansible, Kubernetes, Docker, Jenkins, Puppet

ยท Languages and Frameworks: Golang, Python, JavaScript, Bash, Go REST APIs

ยท Databases and Storage: SQLite3, Redis, PostgreSQL, MySQL, MariaDB

ยท Methodologies: Agile and DevOps, Infrastructure as Code (IaC), CI/CD Pipeline Automation

ยท NIST/ISO 27001 governance and designing systems to support compliance

ยท Demonstrated success in leading software development from concept to production

ยท Proficiency in Agile methodologies, including sprint planning and execution

ยท Strong theoretical foundation in cryptography

ยท Deep understanding of layered, end-to-end security principles

ยท Familiarity with cybersecurity monitoring and analytics

ยท Ability to define, prioritize, and estimate tasks and delivery timelines

ย 

Preferred Experience

ยท Vulnerability management automation

ยท Large scale high velocity data ingestion and integrations

ยท Centralized monitoring and incident response

ยท Cloud and infrastructure security

ยท 10+ years of experience in Embedded Security and Application Security

ยท Proven success in fast-paced, startup-like environments

ยท Deep expertise in designing and implementing cybersecurity methodologies compliant with industry standards

ยท Strong technical knowledge of cryptographic hardware, key management, and certificate management

ยท Extensive experience in threat modeling, attack analysis, and penetration testing

ยท Experience integrating security across the product development lifecycle

ยท Strong grasp of network security, including TCP/IP, HTTP, TLS, DDoS, intrusion detection/prevention

ยท Experience with socket programming and network anomaly detection tools (NIDS/HIDS)

ยท Familiarity with Agile development methodologies

ยท Proven experience managing cybersecurity development programs

ย  At Lucid, we donโ€™t just welcome diversity - we celebrate it! Lucid Motors is proud to be an equal opportunity workplace. We are committed to equal employment opportunity regardless of race, color, national or ethnic origin, age, religion, disability, sexual orientation, gender, gender identity and expression, marital status, and any other characteristic protected under applicable State or Federal laws and regulations.

By Submitting your application, you understand and agree that your personal data will be processed in accordance with our Candidate Privacy Notice. If you are a California resident, please refer to our California Candidate Privacy Notice.

To all recruitment agencies: Lucid Motors does not accept agency resumes. Please do not forward resumes to our careers alias or other Lucid Motors employees. Lucid Motors is not responsible for any fees related to unsolicited resumes.ย 
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index ๐Ÿ’ฐ

Job stats:  0  0  0

Tags: Agile Analytics Ansible APIs Application security Automation AWS Azure Bash Certificate management CI/CD Cloud Compliance Cryptography CVSS DDoS DevOps Docker EDR ERP Firewalls GCP Golang Governance Grafana IAM Incident response Intrusion detection ISO 27001 JavaScript Jenkins Kubernetes Monitoring MySQL Network security NIST Pentesting PostgreSQL Privacy Prometheus Puppet Python Redis Scripting SIEM Splunk TCP/IP Terraform Threat intelligence TLS Vulnerability management Zero Trust

Perks/benefits: Startup environment

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.