Senior Cybersecurity Engineer
Houston, TX, United States
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
WM
WM is the leading provider of comprehensive waste management, offering services such as garbage collection, recycling pickup and dumpster rental.Waste Management (WM), a Fortune 250 company, is the leading provider of comprehensive waste and environmental services in North America. We are strongly committed to a foundation of operating excellence, professionalism and financial strength. WM serves nearly 25 million customers in residential, commercial, industrial and municipal markets throughout North America through a network of collection operations, transfer stations, landfills, recycling facilities and waste-based energy production projects.
To enable our business to expand our lead in a market increasingly enhanced by technology, Waste Management is undertaking a substantial technology transformation. We are seeking talented Information Technology professionals to join the Waste Management team who are motivated to help us transform the way we design, build and use technology. With your skills and experience, we look for you to combine your technical expertise with industry best practices in an effort to align information technology solutions with Waste Management business strategy.
I. Job Summary
As a Senior Security Analyst (Engineering), you will support the strategic development and execution of the organization’s security technology roadmap. This role is centered on building a scalable, future-ready security stack through disciplined technology hygiene, seamless tool integrations, and timely upgrades.
You will be responsible for managing and growing a high-performing team of security engineers, fostering a culture of innovation, accountability, and continuous improvement. Your leadership will ensure the team remains aligned with long-term security objectives while staying agile in response to evolving threats and business needs.
In this position, you will drive the design, optimization, and lifecycle management of the security technology stackk. You will lead integration efforts to enhance interoperability and reduce complexity across the security ecosystem, while ensuring consistent technology hygiene through proactive maintenance and upgrades. By identifying capability gaps and guiding the evolution of the security architecture, you will help shape a resilient and adaptive security posture. Additionally, you will mentor and develop engineering talent, scaling the team to support organizational growth and maturity. Your work will directly influence the agility, resilience, and long-term effectiveness of the enterprise’s security infrastructure.
II. Essential Duties and Responsibilities
To perform this job successfully, an individual must be able to perform each duty satisfactorily. Other ancillary duties may be assigned.
- Responsible for the design and implementation of secure email gateways (e.g. Microsoft, ProofPoint, or Mimecast), email filtering, SPF/DKIM/DMARC, sandboxing and related technologies including cloud-based email threat prevention platforms.
- Design and implement security systems that prioritize accuracy, depth, and resilience. Continuously validate data integrity and system behavior, using engineered baselines and anomaly detection to surface deviations early in the lifecycle of potential threats.
- Routinely evaluate and recommend adoption, enhancement, or replacement of security-related hardware and software solutions to strengthen the organization’s security posture. Standup, manage and complete Proof-of-Concept (POC) and Proof-of-Value (POV) exercises and security vendors and providers.
- Work alongside others to establish and maintain detection pipelines by engineering integrations across the organization’s security fabric. Develop and refine telemetry ingestion, parsing, and correlation logic to ensure accurate identification of malicious activity to support scalable, automated incident response across the enterprise.
- Develop and review secure architecture patterns for new systems, applications, and infrastructure. Ensure that security is embedded into the design phase by collaborating with solution architects and developers to implement secure-by-design principles.
- Engineer and automate routine security operation and remediation workflows across endpoints, servers, containers, and cloud environments, leveraging Security Orchestration and Automated Response (SOAR) solutions as well as agentic solutions. Analyze results, prioritize findings based on risk, and coordinate with system owners to implement long-term fixes.
- Collaborate to enhance detection content, improve monitoring coverage, and refine operational procedures—including runbooks, standards, and response workflows—to ensure consistent and effective threat management.
- Facilitate coordination and resolution of Level 2 and Level 3 security technology disruptions and outages.
- Provides analysis and support for general infrastructure planning and design to meet security objectives.
- Stay current on cybersecurity threat landscape, threat actor and technology trends to proactively evolve security strategies
- Apply creative problem-solving and strong collaboration skills to work closely with IT operations and engineering teams, delivering clear and actionable remediation guidance that addresses root causes and strengthens the organization’s overall security posture.
- Establish and maintain a structured upgrade and hygiene program to ensure all existing and newly deployed security solutions are regularly updated, patched, and aligned with industry best practices and organizational security standards.
- Off hours support required due to the 24x7 nature of this team via a call tree/on-call schedule.
III. Supervisory Responsibilities
May coach and mentor less-experienced analysts and act as team leader on systems projects.
IV. Qualifications
The requirements listed below are representative of the qualifications necessary to perform the job.
A. Education and Experience
- Education: Bachelor's degree (accredited) in Computer Science, MIS, Business Administration or similar area of study, or in lieu of degree, High School Diploma or GED (accredited) and 4 years or relevant work experience.
- Experience: Five years of relevant work experience (in addition to education requirement).
B. Certificates, Licenses, Registrations or Other Requirements
Preferred certifiations:
- Certified Information Systems Security Professional (CISSP)
- Certified Information Systems Auditor (CISA)
- Certified Information Security Manager (CISM)
- Other professional certifications include: CEH, GCIH.
- Other vendor certifications desired include: CCNA, CCNP, CCSP, MSCE
C. Other Knowledge, Skills or Abilities Required
Advanced knowledge or skills in one or more of the following is required:
- Exceptional communication skills—written, verbal, and active listening—to effectively convey complex technical information and ensure clarity and alignment in high-pressure or fast-paced security operations environments.
- Functional knowledge of modernin cybersecurity technology including M365 Security, Email security Gateways, automation platforms and artificial intelligence solutions
- Exposure and familiarity in developing general security operations procedures and optimizing existing processes.
- Technical skills across a broad range of computing platforms and network protocols.
- Experience in several or more of the following technologies: Firewalls, Intrusion Prevention, Vulnerability Scanning, Data Loss Prevention, Email Security, Endpoint Security, DNS, Web Content Filtering, SIEM, Certificates and encryption.
- Understanding and experience with IP address space management, subnetting, name resolution.
- Familiarity with key security models and regulations such as Mitre ATTACK, NIST CSF, SOX and PCI.
- Ability to support both internal and external audits.
- Experience in the areas of change control, problem management, incident management troubleshootingsecurity tools, architecture and deployments
- Ability to multi-task and work on multiple projects at one time.
- Fortune 500 or large enterprise experience
- Proficiency in investigative practices and procedures (forensics knowledge is a plus).
V. Work Environment Listed below are key points regarding environmental demands and work environment of the job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of the job.
Normal setting for this job is: office setting.
Benefits
At Waste Management, each eligible employee receives a competitive total compensation package including Medical, Dental, Vision, Life Insurance and Short Term Disability. As well as a Stock Purchase Plan, Company match on 401K, and more! Our employees also receive Paid Vacation, Holidays, and Personal Days. Please note that benefits may vary by site.
If this sounds like the opportunity that you have been looking for, please click “Apply”.
ABOUT WM WM (WM.com) is North America’s largest comprehensive waste management environmental solutions provider. Previously known as Waste Management and based in Houston, Texas, WM is driven by commitments to put people first and achieve success with integrity. The company, through its subsidiaries, provides collection, recycling and disposal services to millions of residential, commercial, industrial and municipal customers throughout the U.S. and Canada. With innovative infrastructure and capabilities in recycling, organics and renewable energy, WM provides environmental solutions to and collaborates with its customers in helping them achieve their sustainability goals. WM has the largest disposal network and collection fleet in North America, is the largest recycler of post-consumer materials and is the leader in beneficial reuse of landfill gas, with a growing network of renewable natural gas plants and the most gas-to-electricity plants in North America. WM’s fleet includes nearly 11,000 natural gas trucks – the largest heavy-duty natural gas truck fleet of its kind in North America – where more than half are fueled by renewable natural gas. To learn more about WM and the company’s sustainability progress and solutions, visit Sustainability.WM.com.Equal Employment Opportunity
For United States: WM is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
For Canada: WM is committed to the principle of equal employment for all applicants and employees, without discrimination on the basis of all grounds protected by applicable human rights legislation. Accommodations are available on request for candidates taking part in all aspects of the selection process. Please notify us if you require accommodation.
Real ID
In order to travel by air or access federal property, federal law requires individuals have a REAL ID or an acceptable alternative. This position may require the successful candidate to travel by air for business reasons, or service federal property. Accordingly, successful candidates must have, or be willing to obtain, a REAL ID, or TSA approved alternative.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Artificial Intelligence Audits Automation C CCNP CCSP CEH CISA CISM CISSP Cloud Computer Science DNS Encryption Endpoint security Firewalls Forensics GCIH Incident response Industrial Intrusion prevention Monitoring NIST SIEM SOAR SOX Strategy
Perks/benefits: 401(k) matching Career development Competitive pay Equity / stock options Health care Insurance Startup environment
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.