Logo for The Home Depot

Cybersecurity Senior Engineer - Non Human Identity (Remote)

Roles & Responsibilities

  • High school diploma or GED
  • 18+ years old and legally permitted to work in the United States
  • Minimum of 3 years of work experience in cybersecurity, IAM, or related fields
  • Experience with non-human identity discovery automation across servers, applications, cloud platforms, and CI/CD pipelines; proficiency in Python and PowerShell

Requirements:

  • Design, build, configure, and monitor automation workflows for NHI discovery, data collection, investigation, and incident response
  • Develop threat hunting and data analysis strategies; identify new technologies and approaches to detect malicious activity; use indicators to scope and respond to threats
  • Govern NHI lifecycle including onboarding, access reviews, credential rotation, decommissioning; integrate with IAM, PAM, cloud IAM, Secrets management, ITSM; maintain ownership/purpose/lifecycle accountability
  • Collaborate with architecture, IAM, cloud, DevOps, and platform teams to refactor authentication flows toward passwordless NHI designs and provide NHI context to security monitoring and incident response

Job description

With a career at The Home Depot, you can be yourself and also be part of something bigger.

Position Purpose:

The Senior Cybersecurity Engineer – Non‑Human Identity (NHI) partners with Architecture, IAM, cloud, platform, DevOps, and application teams to design, build, and operate enterprise‑scale discovery, governance, and lifecycle automation for non‑human identities (NHIs). NHIs include service accounts, API tokens, cloud IAM roles, automation identities, CI/CD identities, and AI agents across on‑premises, hybrid, and multi‑cloud environments. This role focuses on automation, collaboration, and risk reduction, helping modernize authentication patterns and reduce reliance on long‑lived credentials.


Key Responsibilities:

  • 100% Deliver Execution, Plans & Align, Problem Solving - Design automation workflows and capabilities in support of data collection, investigation and incident response Develop threat hunting and data analysis strategy and capabilities Identify and propose new technologies, methodologies and/or approaches to detecting malicious activity Utilize indicators to scope and respond proactively to emerging threats Design, build, configure, maintain and monitor cybersecurity threat defense capabilities and user access management


Direct Manager/Direct Reports:

  • This Position typically reports to Manager or Sr. Manager
  • This Position has 0 Direct Reports


Travel Requirements:

  • No travel required.


Physical Requirements:

  • Most of the time is spent sitting in a comfortable position and there is frequent opportunity to move about. On rare occasions there may be a need to move or lift light articles.


Working Conditions:

  • Located in a comfortable indoor area. Any unpleasant conditions would be infrequent and not objectionable.


Minimum Qualifications:

  • Must be eighteen years of age or older.
  • Must be legally permitted to work in the United States.


Preferred Qualifications:

Non‑Human Identity Discovery & Automation

  • Work with IAM, Architecture, and platform teams to design and operate automated discovery capabilities for NHIs across servers, applications, cloud platforms, and CI/CD pipelines
  • Contribute to development of automation and tooling (Python, PowerShell) to:
    • Discover NHIs across infrastructure and environments
    • Parse configuration files, logs, APIs, and Infrastructure‑as‑Code to identify embedded or hard‑coded credentials
    • Enrich NHI metadata including ownership, purpose, environment, and lifecycle state
  • Partner with engineering teams to automate NHI hygiene activities such as ownership validation, lifecycle tracking, and reporting

NHI Lifecycle & Governance

  • Collaborate with IAM, Architecture, cloud, and ITSM teams to design and integrate NHI lifecycle workflows, including onboarding, access reviews, credential rotation, and decommissioning
  • Integrate NHI workflows with enterprise platforms, including: IAM and PAM solutions, Cloud IAM services, Secrets management platforms, ITSM and workflow tools
  • Support enforcement of clear ownership, purpose, and lifecycle accountability for NHIs
  • Assist with enterprise access reviews, attestations, and audit evidence generation

Partner with application, platform, and DevOps teams to analyze authentication flows and refactor legacy patterns toward modern, password‑less NHI designs, including managed identities, OAuth client credentials, and short‑lived tokens.

  • Provide NHI context to security monitoring and incident response teams to support investigations involving service account misuse, anomalous automation behavior, or credential compromise
  • Apply data‑driven techniques such as pattern recognition, baselining, and anomaly indicators to analyze NHI usage trends and detect drift or misuse.

AI Agent Identity Governance

  • Partner with architecture and platform teams to support onboarding and governance of AI agents as non‑human identities
  • Help ensure AI agents have clearly defined ownership, scoped access, and documented lifecycle expectations

Basic PKI Responsibilities (Foundational)

  • Support certificate‑based NHIs (e.g., TLS, mTLS, client authentication) as part of broader NHI governance
  • Integrate NHI discovery and lifecycle workflows with enterprise PKI and certificate management platforms
  • Ensure certificates and private keys follow approved standards for issuance, rotation, and expiration, without direct ownership of PKI infrastructure
  • Collaborate across security, cloud, and platform engineering teams to align NHI controls with Zero Trust principles and THD security standards.
  • Produce and maintain technical documentation, runbooks, and onboarding guides, and support audit and compliance activities through NHI evidence and reporting.
  • Continuously improve the NHI program by identifying automation opportunities, reducing operational toil, and improving accuracy, coverage, and maturity of non‑human identity controls.


Minimum Education:

  • The knowledge, skills and abilities typically acquired through the completion of a high school diploma and/or GED.


Preferred Education:

  • No additional education


Minimum Years of Work Experience:

  • 3


Preferred Years of Work Experience:

  • No additional years of experience


Minimum Leadership Experience:

  • None


Preferred Leadership Experience:

  • None


Certifications:

  • None


Competencies:

  • Action Oriented
  • Collaborates
  • Communicates Effectively
  • Customer Focus
  • Drives Results

For California, Colorado, Connecticut, Rhode Island, Nevada, New York City, Ithaca (NY), Westchester County (NY), and Washington residents:
 

The pay range for this position is between $120,000 - $180,000

Cybersecurity Engineer Related jobs

Other jobs at The Home Depot

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.