Security Engineer Job Description: Duties, Skills, Salary, and Career Path
Security Engineers are software engineers who specialize in defending production systems: reviewing application designs for security flaws, modeling threats against the architecture, building detections that catch attackers in motion, owning the incident-response rotation, designing identity and access controls, and partnering with software engineering to ship code that does not become tomorrow's breach. Unlike Site Reliability Engineering, Security Engineering maps cleanly to a dedicated U.S. Bureau of Labor Statistics occupation: SOC 15-1212 Information Security Analysts, with a May 2024 median annual wage of $124,910, a projected 29 percent employment growth from 2024 to 2034 (much faster than average), and about 16,000 openings projected each year over the decade [1]. Self-reported levels.fyi data is the more accurate compensation anchor for in-house Security Engineering roles at modern tech companies, where the discipline levels on the same Software Engineer ladder [2].
Key Takeaways
- Security Engineers operate the defenses that protect the services backend and platform engineers ship, owning AppSec review, threat modeling, detection engineering, incident response, identity and access design, and vulnerability management.
- BLS classifies the role under SOC 15-1212 Information Security Analysts: $124,910 May 2024 median, 29 percent projected growth through 2034, and roughly 16,000 openings per year [1]. This is one of the fastest-growing tech occupations BLS tracks.
- Real Security Engineering compensation at modern tech companies tracks the Software Engineer ladder, not the BLS Information Security Analyst median. levels.fyi maintains per-company filters at levels.fyi/t/security-engineer; use those rather than any single-number claim [2].
- Core skills include OWASP Top 10 fluency, threat modeling (STRIDE or attack-tree), the NIST Cybersecurity Framework 2.0 functions, MITRE ATT&CK fluency for detection work, depth in at least one server-side language, and a working model of the secure software development lifecycle (SSDLC).
- The OWASP Top 10 (2021), OWASP Application Security Verification Standard (ASVS), NIST CSF 2.0 (February 2024), and the MITRE ATT&CK matrix are the canonical 2026 references for the discipline; all four are free and are widely used in interview preparation and on-the-job practice [3][4][5][6].
- Security Engineer, AppSec Engineer, Detection Engineer, Cloud Security Engineer, Identity Engineer, and DevSecOps Engineer titles overlap heavily — this guide decodes the differences as they actually appear in 2026 job descriptions.
What Does a Security Engineer Do?
A Security Engineer designs, reviews, and operates the defenses that keep a company's production systems and customer data safe, with the explicit goal of making security a measurable engineering property of the system rather than a checklist applied at the end. The discipline blends application-security review, threat modeling, detection engineering, incident response, and identity-and-access design — all conducted with a software-engineer's mindset, instrumenting and automating defenses rather than writing policy documents.
The work is structured around an adversarial feedback loop: model the threats against the system, review designs and code for the flaws those threats would exploit, instrument the production environment so attacker activity produces a signal, alert on those signals when they cross a meaningful threshold, respond to incidents using a documented playbook (the NIST SP 800-61 Computer Security Incident Handling Guide is the canonical reference), conduct a postmortem that names the systemic causes, and engineer the remediation so the same class of incident does not happen twice [7]. The NIST Cybersecurity Framework 2.0 (February 2024) organizes this work into six functions — Govern, Identify, Protect, Detect, Respond, and Recover — and is the most widely cited 2026 control framework [4].
A typical day blends building and defending. Security Engineers spend mornings on focused engineering work: reviewing the threat model on a new service, writing a Semgrep rule that catches an authorization bug pattern at PR time, building a detection in the SIEM for a specific MITRE ATT&CK technique, designing the IAM boundary around a sensitive data service, or scoping a penetration-test engagement. Afternoons often shift to incident triage, vulnerability management (the CISA Known Exploited Vulnerabilities catalog is the operational priority list), security review meetings with product engineering, and the long tail of partner work — answering questions from a backend team, helping platform engineers design a Zero Trust deployment, or responding to a customer security questionnaire [8].
The output is rarely a single feature. It is more often a system property: an authorization model that holds under adversarial pressure, a detection pipeline that catches real attacker behavior with a low false-positive rate, an incident-response rotation that contains breaches before they spread, an SSDLC that makes the secure path the path of least resistance for product engineers. Senior Security Engineers in 2026 are expected to read offensive-research output (Google Project Zero's blog is the most-cited source) and translate it into defensive engineering work that the rest of the org can adopt [9].
Daily Responsibilities
Primary duties, roughly 60 percent of a Security Engineer's time:
- Application security review and threat modeling for the services on the team's portfolio, including reading design documents and code, running STRIDE or attack-tree exercises with the product team, and producing the prioritized list of issues that engineering will fix before launch. The OWASP Top 10 (2021), OWASP Application Security Verification Standard, and OWASP Software Assurance Maturity Model (SAMM) are the canonical reference points [3][10][11].
- Detection engineering and security monitoring, building queries and rules in the SIEM (Splunk, Elastic, Chronicle, Sentinel, or a custom pipeline) that detect known attacker techniques, instrumenting services with security-relevant audit logs, and curating the alert pipeline that on-call uses during an incident. The MITRE ATT&CK matrix is the canonical 2026 framework for naming what you are detecting [5].
- Incident response and on-call, including primary and secondary rotations, incident command during major events, the post-incident review process, and the action-item tracking that turns reviews into engineering remediations. NIST SP 800-61 documents the canonical phases (Preparation, Detection and Analysis, Containment Eradication and Recovery, Post-Incident Activity) [7].
- Identity and access management design, including the IAM model for cloud accounts (AWS IAM, Azure entitlements, GCP IAM), the workload-identity surface (SPIFFE / SPIRE, OIDC federation), and the human-access surface (SSO, MFA enforcement, just-in-time access). NIST SP 800-207 Zero Trust Architecture is the canonical reference for the boundary-less model that has displaced traditional perimeter security [12].
- Vulnerability management and patch governance, including running the SAST / DAST / SCA toolchain, prioritizing findings using the CISA Known Exploited Vulnerabilities catalog and CVSS context, and partnering with platform engineering on the patch SLA for OS, runtime, and container images [8].
Secondary responsibilities, roughly 30 percent:
- Secure SDLC integration, embedding security checks into the CI/CD pipeline (pre-commit hooks, PR-time SAST, image-scanning gates, IaC policy-as-code such as OPA or Conftest), per the NIST Secure Software Development Framework (SSDF, SP 800-218) [13].
- Red-team partnership and offensive testing, scoping internal red-team exercises or external penetration tests, reviewing the findings, and prioritizing the remediation work. SANS Institute publishes the most-cited 2026 curricula (GIAC GPEN, GWAPT, GXPN) for offensive practitioners; Security Engineers do not always perform the offense but must understand its outputs [14].
- Security partnership and code review with backend and platform engineers, including production-readiness reviews focused on authentication, authorization, secrets management, transport encryption, and data classification.
- Compliance and audit support, including SOC 2, ISO 27001, PCI DSS, HIPAA, or FedRAMP work where applicable. Modern Security Engineers automate this work as compliance-as-code rather than treating it as a paperwork exercise.
Remaining 10 percent typically goes to interviewing, mentoring, internal documentation (runbooks, threat-model templates, the postmortem archive), tracking the offensive-research literature, and the security-conference work that keeps senior+ engineers current on the field [9][14].
Seniority Levels and Compensation
Security Engineers at most modern tech companies level on the same Software Engineer ladder as backend and platform engineers, with parallel titles and comp bands. Where titles diverge — "Security Engineer I / II / III," "AppSec Engineer," "Product Security Engineer," "Detection Engineer" — the underlying ladder structure is parallel. levels.fyi maintains a Security Engineer track at levels.fyi/t/security-engineer with per-company filters that capture base, equity, and bonus separately [2]. Use those filters as the actual anchor; comp varies materially by company, level, equity package, and location, so any single-number claim should be treated with skepticism. The level descriptions below describe the work; numeric ranges are not in the cited dataset and are intentionally omitted.
Junior Security Engineer / Security Engineer I (0–2 years). Pairs with a senior on AppSec reviews and incident response, owns small slices of the on-call rotation under supervision, ships well-scoped detection or automation work, runs the vulnerability-management triage queue, and learns the production stack and the threat landscape.
Mid-level Security Engineer / Security Engineer II (2–5 years). Owns AppSec reviews end-to-end for assigned services, leads incident response on routine events, ships threat models and detections independently, drives security partnership with one or two product teams, and starts to own a discipline area (e.g., authorization patterns, secrets management, container security).
Senior Security Engineer (5–8 years). Owns the security posture of an entire service area or domain (AppSec, cloud, identity, detection), acts as incident commander on major events, sets security policy in partnership with engineering and product, mentors junior and mid-level engineers, and represents Security in cross-functional design reviews. The senior bar is being a real software engineer first who happens to specialize in offense-aware defensive engineering.
Staff Security Engineer (8–12 years). Sets security strategy across multiple service areas or for an entire discipline (e.g., AppSec lead, Detection Engineering lead, Cloud Security lead), drives multi-quarter security investment, owns the most-complex incident retrospectives, runs the team's interview loop and hiring bar, and is the technical authority that engineering leadership consults on the hardest design decisions.
Principal Security Engineer / Distinguished Engineer (12+ years). Sets security discipline across the whole engineering org, acts as the technical authority on the hardest production incidents (and the highest-stakes design decisions), represents the company's security work externally (conference talks, advisory board work, public security reporting), and partners with executive leadership on the security investment portfolio. Compensation at this level is heavily skewed by equity and varies by an order of magnitude across employers; check levels.fyi by company [2].
Common Job Description Phrases, Decoded
Security Engineer job descriptions are remarkably consistent across companies. The phrases below recur in the majority of senior+ Security Engineer postings; what they actually mean in practice is often less obvious to candidates outside the discipline.
"Secure SDLC" or "Shift-left security" — security checks happen at design, code, and PR time rather than at the end of the release cycle. In practice this means threat models on every non-trivial design doc, PR-time SAST that blocks the merge on high-severity findings, image-scanning gates in the build pipeline, and IaC policy-as-code that fails the plan when a public S3 bucket appears. The NIST Secure Software Development Framework (SP 800-218) is the canonical reference [13].
"Threat modeling" — you can sit with a backend team, read the design doc, and produce a prioritized list of attacker scenarios and the mitigations that address each. STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege) is the most common 2026 framework; attack trees and abuser-story methods also appear. The output is a one-page artifact engineering will actually act on, not a three-hundred-page document [10][11].
"Zero Trust" — the security model articulated in NIST SP 800-207 in which trust is never implicit, every request is authenticated and authorized at the time it is made, and the network perimeter is no longer the load-bearing security boundary [12]. In practice this means workload identity (SPIFFE / SPIRE, OIDC federation, mTLS), continuous authorization, just-in-time human access, and a hard-rejection model for unauthenticated traffic. "Zero Trust" is also a heavily-marketed phrase; senior+ candidates are expected to articulate the substance behind the term.
"Detection engineering" — building, tuning, and maintaining the rules and queries that detect attacker behavior in the production environment, treating detections as software with versioning, testing, and on-call ownership. The MITRE ATT&CK matrix is the canonical mapping for what you are detecting and at what stage of the kill chain [5]. Healthy detection-engineering practice includes detection-as-code, alert-fatigue measurement, and the explicit retirement of low-value rules.
"OWASP Top 10 fluency" — you can articulate each of the 2021 categories (Broken Access Control through Server-Side Request Forgery), spot instances of each in code review, and design the controls that prevent them. The OWASP Application Security Verification Standard (ASVS) is the operational checklist most senior+ AppSec engineers actually use during reviews [3][6].
"Compliance-as-code" — treating compliance controls as testable software rather than auditor paperwork. In practice this means OPA / Conftest policies that gate the IaC plan, automated evidence collection for SOC 2 / ISO 27001 audits, and CI checks that prevent drift from the documented baseline. The trend in 2026 is toward continuous compliance with auditor read-only dashboards rather than annual audit sprints.
"Identity and access management" — at minimum, you understand the AWS / GCP / Azure IAM model and can design a least-privilege policy. At senior+, you can defend a workload-identity architecture, articulate the trade-offs in a federated SSO design, and reason about session-token revocation and just-in-time access. NIST SP 800-207 is the reference frame [12].
"Cloud security experience" — at minimum, you can read an AWS CloudTrail log and identify suspicious API activity. At senior+, you can design a multi-account organizational structure, write the SCPs that defend the boundary, configure GuardDuty / Defender / SCC at scale, and reason about the trust boundaries between IAM roles, KMS keys, and resource-based policies.
"Incident response leadership" — you can act as incident commander on a major security event, which means controlling scope, delegating sub-tasks (forensics, customer comms, legal partnership), communicating to stakeholders during the incident, and running the postmortem afterwards. Senior+ Security Engineers are expected to grow into this role within their first 12 months. NIST SP 800-61 documents the canonical phase model [7].
"AI / LLM security" — increasingly common in 2026 postings. The OWASP Top 10 for LLM Applications is the canonical reference frame, covering prompt injection, training-data poisoning, model denial of service, supply-chain risk, sensitive information disclosure, insecure output handling, excessive agency, and the rest [15]. NIST also publishes the AI Risk Management Framework (AI RMF) for the broader governance question [16].
"Programming background required" — you can pass a coding interview that a backend engineer would pass. The shape varies by company, but every senior+ Security Engineering loop in 2026 includes algorithmic coding, system-design with security framing, and a security-specific deep-dive (threat modeling, code review, incident scenario). Security Engineering is a software-engineering discipline, not an audit role with code on the side.
Security Engineer vs AppSec vs Detection vs Cloud Security vs Identity vs DevSecOps
Six titles overlap heavily in the 2026 Security job market, with real but smaller differences. The team's primary deliverable and the ratio of design-time vs run-time work are what separate the roles in practice.
Security Engineer (generalist). The catch-all title at most companies. Owns a mix of AppSec review, threat modeling, IAM design, detection engineering, and incident response. At small companies (under ~200 engineers) one Security Engineer wears all the hats; at larger companies the title typically signals an AppSec or product-security focus by default. Read the JD carefully.
Application Security Engineer (AppSec). Specializes in code-level and design-level review of the application layer. Owns the SSDLC, the SAST / DAST / SCA toolchain, the threat-modeling discipline, and the security partnership with product engineering teams. The OWASP corpus (Top 10, ASVS, SAMM) is the operational reference set [3][6][11]. AppSec is the most common Security Engineering specialization at modern tech companies.
Detection Engineer. Specializes in the run-time detection layer — building, tuning, and maintaining the SIEM rules, EDR queries, and custom detection pipelines that surface attacker behavior. The MITRE ATT&CK matrix is the canonical 2026 reference for what is being detected [5]. Detection Engineering as a distinct title emerged around 2020 and is now standard at companies large enough to run an internal SOC.
Cloud Security Engineer. Specializes in the security posture of the cloud-platform layer (AWS, GCP, Azure, or multi-cloud). Owns the multi-account organizational structure, the SCP / Org Policy boundary, the IAM model, the workload-identity surface, the cloud-native detection pipeline (GuardDuty, Security Command Center, Defender for Cloud), and the IaC policy gates. Often partners closely with Platform Engineering on the developer-facing cloud surface.
Identity Engineer (IAM Engineer). Specializes in the authentication and authorization surface for both human users (SSO, MFA, SCIM provisioning, just-in-time access, session management) and workloads (SPIFFE / SPIRE, OIDC federation, mTLS, service-to-service auth). NIST SP 800-207 is the reference frame [12]. Identity Engineering is a distinct discipline at companies large enough to need a dedicated team; at smaller companies it folds into Security Engineering or Platform Engineering.
DevSecOps Engineer. The current 2026 framing of platform-engineering work with a security focus. Builds the CI/CD security gates, the IaC policy substrate, the secrets-management surface, the container-build hardening, and the developer-facing security tooling. The role overlaps heavily with Platform Engineer and Cloud Security Engineer; the specific shape depends on how the org has split the work.
At small companies (under ~50 engineers), one person typically wears all six hats. At mid-size companies, AppSec and Detection are usually distinct teams with Cloud Security folded into one or the other. At large tech companies, all six exist as separate disciplines, with AppSec embedded near product teams, Detection running the SOC, Cloud Security owning the platform boundary, Identity owning the auth surface, and DevSecOps owning the CI/CD security tooling.
Required Skills vs Nice-to-Haves
The skills below appear in 90 percent of senior+ Security Engineer job descriptions in 2026 and are reliable signals of the actual operational stack you will work in.
Hard requirements at the senior+ bar:
- OWASP Top 10 (2021) fluency at the design and code-review level, plus the OWASP Application Security Verification Standard (ASVS) as an operational checklist [3][6].
- Threat-modeling methodology (STRIDE, attack trees, or abuser-story format) and the ability to run a threat-model session with a product team that produces actionable engineering output [10].
- NIST Cybersecurity Framework 2.0 and the six functions (Govern, Identify, Protect, Detect, Respond, Recover) as the organizing reference for security work, plus the relevant NIST SP 800 series for incident response (800-61), Zero Trust (800-207), and secure software development (800-218) [4][7][12][13].
- MITRE ATT&CK matrix fluency for the detection-engineering work and the cross-team incident-response language [5]. CWE for the code-level vulnerability vocabulary [17].
- Cloud security depth in at least one provider (AWS, GCP, or Azure) at the IAM, networking, and audit-log level. Multi-cloud is a senior+ differentiator.
- One systems language at production depth: Python is the universal Security Engineering language for tooling and automation; Go appears at companies with heavy Kubernetes and CNCF investment; one of Rust, Java, or C++ for the offensive-research and binary-analysis edge.
- Linux and networking depth sufficient to read tcpdump, debug a TLS handshake, audit a Linux syscall trace, and reason about the kernel security surface (seccomp, AppArmor, SELinux, eBPF).
- Incident-response and incident-command experience on real production events, including running blameless postmortems with engineering and security framing.
- On-call participation and the resilience to operate calmly during active incidents, including breach-class events with legal, customer-comms, and executive-stakeholder pressure.
Frequent nice-to-haves:
- Offensive-security skill (OSCP, GIAC GPEN / GWAPT / GXPN, or demonstrated bug-bounty / CTF track record) per the SANS Institute curricula and the broader offensive-security community [14].
- Security certifications: CISSP for the breadth credential, the SANS / GIAC track for technical depth, and the cloud-provider security specialties (AWS Certified Security – Specialty, Google Professional Cloud Security Engineer) for cloud-focused roles. Useful for credentialing but not load-bearing in a strong technical loop.
- Open-source contributions to security tooling (Semgrep rules, Sigma detections, OSQuery packs, OpenTelemetry security exporters, Falco rules) — high-leverage signal at the staff+ bar.
- Conference-talk presence in the security community (Black Hat, DEF CON, BSides, RSA, security-focused engineering conferences) — high-leverage signal at the staff+ bar.
- AI / LLM security fluency per the OWASP LLM Top 10 and the NIST AI RMF — increasingly common in 2026 senior+ postings [15][16].
- AI-augmented Security workflow fluency: using Claude Code or Cursor to scaffold detection-as-code rules, accelerate incident-triage timelines, and review IaC for misconfiguration. The senior-bar discipline is articulating where AI accelerates security work and where it degrades quality (false-positive volume, hallucinated CVE references, missed business-logic flaws).
Education and Credentials
The BLS Information Security Analysts profile (SOC 15-1212) lists a bachelor's degree as typical entry education, most commonly in computer science, information assurance, programming, or a related field [1]. In Security Engineering specifically, the historical paths are computer science, computer engineering, electrical engineering, or information-security degrees. A meaningful share of the working population entered through adjacent paths: backend engineers who moved into AppSec, system administrators who picked up software engineering, military and federal-government cyber backgrounds, bootcamp graduates who cleared the senior-coding bar after several years of operational work, and self-taught practitioners with substantial CTF, bug-bounty, or open-source security tooling track records.
Certifications carry more weight in Security Engineering than in adjacent disciplines, but they are still rarely load-bearing in a strong technical loop. The credentials most commonly cited in 2026 senior+ JDs are CISSP (breadth and management track), the SANS / GIAC technical certifications (GSEC, GPEN, GWAPT, GCIH, GREM, GXPN, depending on focus), CompTIA Security+ for entry-level roles, and the cloud-provider security specialties (AWS Certified Security – Specialty, Google Professional Cloud Security Engineer, Microsoft AZ-500) for cloud-focused work. OSCP from Offensive Security is the most-respected credential on the offensive side and signals demonstrated hands-on capability rather than multiple-choice mastery [14].
At the senior and staff levels, demonstrated security-engineering work weighs heavily regardless of credential path. Open-source contributions to security tooling, conference-talk track records, public CVE credits, bug-bounty hall-of-fame placements, and a track record of leading incidents at recognizable companies are all reliable proxies. The senior+ bar is genuinely a software-engineering bar plus the offense-aware defensive mindset; either side without the other does not clear the loop at modern tech companies.
BLS Occupation Data
Unlike Site Reliability Engineering, Security Engineering maps cleanly to a dedicated U.S. Bureau of Labor Statistics occupation: SOC 15-1212 Information Security Analysts. The BLS Occupational Outlook Handbook reports the following May 2024 figures for the occupation [1]:
- Median annual wage: $124,910
- Projected employment growth, 2024–2034: 29 percent (BLS classifies this as "much faster than average")
- Projected annual openings, 2024–2034: approximately 16,000 per year
- Typical entry-level education: Bachelor's degree
- Typical work experience in a related occupation: Less than 5 years
The 29 percent projected growth makes Information Security Analysts one of the fastest-growing tech occupations BLS tracks — substantially higher than the 16 percent projected for Software Developers (SOC 15-1252) or the 5 percent average across all occupations. The driver in the BLS narrative is the rising frequency and cost of cyberattacks, the expansion of cloud and remote-work surfaces, and the increasing regulatory pressure on companies that handle sensitive data [1].
For real Security Engineering compensation data at modern tech companies, the levels.fyi Security Engineer track is more accurate than the BLS median because it captures total compensation (including equity) at the companies where the modal Security Engineering job exists [2]. The BLS median includes a wide range of employers — government, defense contractors, banks, healthcare, mid-market, and the FAANG-tier and frontier-AI companies — and the variance between those segments is substantial. Any single-number "Security Engineer salary" claim should be treated with skepticism.
Frequently Asked Questions
Is Security Engineer the same as Information Security Analyst? The BLS occupation code SOC 15-1212 covers both titles, but in modern tech companies "Security Engineer" implies a software-engineering discipline (writing code, building tooling, owning detection pipelines) while "Information Security Analyst" tends to imply a SOC-analyst, GRC, or compliance-leaning role. At the senior+ bar in tech, "Security Engineer" is the load-bearing title; at banks, healthcare, government, and defense, the titles often converge or invert.
Do I need a computer science degree? Not strictly. The BLS Information Security Analysts profile lists a bachelor's degree as typical entry education [1], but a meaningful share of the working population entered through adjacent paths — military and federal cyber backgrounds, system administration, self-taught CTF and bug-bounty backgrounds, and bootcamp graduates with strong portfolios. At the senior+ level, demonstrated security-engineering work (open-source contributions, public CVEs, conference talks, incident-leadership track record) weighs heavily regardless of credential path. The senior+ bar is a software-engineering bar plus offense-aware defensive thinking.
What does on-call actually involve for a Security Engineer? On-call Security Engineers respond to security alerts and incidents during their rotation, typically a week long, with primary and secondary shifts. Healthy organizations tune the alert pipeline so pages correspond to actionable security signals rather than noisy thresholds. Response involves triaging the alert, scoping the potential impact, leading or contributing to incident response if a real incident is in motion, and shipping the remediation that prevents the same class of incident. NIST SP 800-61 documents the canonical incident-response phase model [7]. Security on-call differs from SRE on-call in that the page volume is typically lower but the per-incident stakes (breach class, regulatory exposure, customer trust) are higher.
How long does it take to become a senior Security Engineer? Five to eight years of deliberate practice from entry level is typical, with significant variation by company and career path. Some employers promote to senior after three to four years of strong performance and clear ownership; others require six or more years and a track record of leading multiple major incidents or shipping discipline-defining work. The senior bar is genuinely a software-engineering bar plus the offense-aware defensive mindset — coding fluency at the algorithmic-interview level is required at virtually every modern tech company.
What is the difference between AppSec, Cloud Security, Detection Engineering, and Identity Engineering? AppSec specializes in design-time and code-time review of the application layer (OWASP Top 10, ASVS, threat modeling, SAST / DAST / SCA tooling) [3][6]. Cloud Security specializes in the cloud-platform posture (IAM, multi-account structure, workload identity, cloud-native detection). Detection Engineering specializes in the run-time SIEM and EDR layer, building queries and rules mapped to the MITRE ATT&CK matrix [5]. Identity Engineering specializes in the authentication and authorization surface for human users and workloads (SSO, MFA, OIDC, SPIFFE / SPIRE, NIST SP 800-207 Zero Trust) [12]. At small companies one team owns all four; at large tech companies they are distinct disciplines with separate hiring loops.
Is Security Engineering being automated by AI? AI tools have meaningfully changed how Security Engineers write detection rules, scaffold security tooling, accelerate incident triage, and review IaC for misconfiguration — Cursor and Claude Code accelerate the engineering work, and LLM-assisted tools compress the time-to-first-hypothesis during incidents. Demand has not reduced. BLS projects 29 percent growth for SOC 15-1212 through 2034, one of the highest rates BLS tracks [1]. The shape of the work is shifting toward design, review, system architecture, threat modeling, and the human-judgment-under-uncertainty that breach-class incidents demand. New surfaces (the OWASP LLM Top 10, AI supply chain security, prompt-injection defense) are expanding the discipline rather than contracting it [15][16].
What programming languages should a Security Engineer know? At least one language at production depth. Python is the universal Security Engineering language for tooling, automation, detection-as-code, and one-off analysis. Go appears at companies with heavy Kubernetes and CNCF investment (Falco, Tracee, OPA, and most cloud-native security tooling is Go). Rust is increasingly common at the offensive-research and high-performance edge. Java appears at JVM-heavy enterprises; C and C++ appear at the kernel-security and binary-analysis edge. The principle is depth in one, fluency in two more.
Do Security Engineers work remote? Yes, frequently. Most Security Engineering work is conducive to remote distribution because the artifacts — code, threat models, detections, runbooks, postmortems — are inherently asynchronous and text-based. Most major tech companies hire Security Engineers remote-friendly or remote-first. The constraints are time-zone overlap with the team for incident-response coverage, the ability to participate in incidents from your remote setup, and (for some roles handling regulated data) physical-location constraints driven by clearance, residency, or data-sovereignty requirements.
What's the relationship between Security Engineering and SRE? The two disciplines share a software-engineering foundation, an on-call culture, an incident-response orientation, and a measurement-first mindset. SRE defends availability, latency, and correctness; Security defends confidentiality, integrity, and authenticity. The two functions partner closely on incident response (a major outage is sometimes a security event in disguise), on observability (security telemetry rides on the same metrics / logs / traces stack), and on the production-readiness review process. At well-run shops the SRE and Security teams sit nearby, share rituals, and review each other's work. The Google SRE Book and the OWASP / NIST corpus are complementary rather than competing canon.
Sources
- U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, "Information Security Analysts" (SOC 15-1212). https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
- levels.fyi, "Security Engineer Compensation." https://www.levels.fyi/t/security-engineer
- OWASP Foundation, "OWASP Top 10 (2021)." https://owasp.org/Top10/
- National Institute of Standards and Technology, "Cybersecurity Framework 2.0" (February 2024). https://www.nist.gov/cyberframework
- MITRE Corporation, "ATT&CK Matrix for Enterprise." https://attack.mitre.org/
- OWASP Foundation, "Application Security Verification Standard (ASVS)." https://owasp.org/www-project-application-security-verification-standard/
- National Institute of Standards and Technology, "SP 800-61: Computer Security Incident Handling Guide." https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
- Cybersecurity and Infrastructure Security Agency, "Known Exploited Vulnerabilities Catalog." https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Google Project Zero, research blog. https://googleprojectzero.blogspot.com/
- OWASP Foundation, "Threat Modeling." https://owasp.org/www-community/Threat_Modeling
- OWASP Foundation, "Software Assurance Maturity Model (SAMM)." https://owaspsamm.org/
- National Institute of Standards and Technology, "SP 800-207: Zero Trust Architecture." https://csrc.nist.gov/publications/detail/sp/800-207/final
- National Institute of Standards and Technology, "SP 800-218: Secure Software Development Framework (SSDF)." https://csrc.nist.gov/publications/detail/sp/800-218/final
- SANS Institute, "Cybersecurity Training and Certifications." https://www.sans.org/
- OWASP Foundation, "OWASP Top 10 for Large Language Model Applications." https://owasp.org/www-project-top-10-for-large-language-model-applications/
- National Institute of Standards and Technology, "AI Risk Management Framework (AI RMF)." https://www.nist.gov/itl/ai-risk-management-framework
- MITRE Corporation, "Common Weakness Enumeration (CWE)." https://cwe.mitre.org/