Connecting People. Uniting the World. There’s never been a more exciting time to join United Airlines As a global company that operates in hundreds of locations around the world — with millions of customers and tens of thousands of employees — we have a unique responsibility to uplift and provide opportunities in the places where we work, live and fly.
We’re on a path to becoming the best airline in aviation history. Join our Cybersecurity and Digital Risk (CDR) team to help lead the industry in cyber safety, security and resilience. Uniteds CDR team plays a critical role in protecting our operations by enabling secure and resilient systems, managing threats and vulnerabilities, and ensuring swift response and recovery. Our mission is to seamlessly embed cybersecurity and digital risk management into every aspect of our business. We help drive progress and growth through trusted digital solutions, safeguarding assets and empowering our team, all while promoting a cyber-safe and secure environment that supports resilient airline operations.
United offers a competitive benefits package aimed at keeping you happy, healthy, and well-traveled. From employee-run "Business Resource Group" communities to world-class benefits like parental leave, 401(k), and privileges like space-available travel, United is truly a one-of-a-kind place to work. Are you ready to travel the world and help us keep our airline cyber safe? Apply today
Job overview and responsibilities
The Principal Architect - Application Cybersecurity validates that our services, applications, and websites are designed and implemented in accordance with United’s secure development standards. The Principal Architect is a senior level position that works closely with development teams, product teams, and other teams across the organization to design and develop security solutions/applications and integrate security into the product lifecycle from design through deployment.
The Principal Architect is a recognized subject matter expert in defining security requirements, performing application security assessments, and providing developers with remediation guidance and advice. On any given day, the Principal Application Security Architect can be pulled in to evaluate a new system, review a proposed application change, or provide guidance on application security/coding best practices.
Leads architecture design evaluations and threat modelling of our products (cloud and on-prem). Recommends and implements products/services that support operational needs and security requirementsTechnical point of contact for product teams as it relates to automation, CI/CD, and remediation guidanceAssist in leading the design, development, and implementation of security tools, best practices and standards and ensure product development teams understand themPerform code analysis of applications, manually and using SAST, DAST, and SCA scanning solutions as well as conducting manual vulnerability analysisPromotes and contributes to the continuous improvement of security strategy and supports risk prioritizationHelps train and support team membersLeads the improvement of the accessibility of security through automation, continuous integration pipelines, and other meansEducate and mentor junior team membersEnsures program(s) is meeting intended purpose and metricsConnecting People. Uniting the World. There’s never been a more exciting time to join United Airlines As a global company that operates in hundreds of locations around the world — with millions of customers and tens of thousands of employees — we have a unique responsibility to uplift and provide opportunities in the places where we work, live and fly.
We’re on a path to becoming the best airline in aviation history. Join our Cybersecurity and Digital Risk (CDR) team to help lead the industry in cyber safety, security and resilience. Uniteds CDR team plays a critical role in protecting our operations by enabling secure and resilient systems, managing threats and vulnerabilities, and ensuring swift response and recovery. Our mission is to seamlessly embed cybersecurity and digital risk management into every aspect of our business. We help drive progress and growth through trusted digital solutions, safeguarding assets and empowering our team, all while promoting a cyber-safe and secure environment that supports resilient airline operations.
United offers a competitive benefits package aimed at keeping you happy, healthy, and well-traveled. From employee-run "Business Resource Group" communities to world-class benefits like parental leave, 401(k), and privileges like space-available travel, United is truly a one-of-a-kind place to work. Are you ready to travel the world and help us keep our airline cyber safe? Apply today
Job overview and responsibilities
The Principal Architect - Application Cybersecurity validates that our services, applications, and websites are designed and implemented in accordance with United’s secure development standards. The Principal Architect is a senior level position that works closely with development teams, product teams, and other teams across the organization to design and develop security solutions/applications and integrate security into the product lifecycle from design through deployment.
The Principal Architect is a recognized subject matter expert in defining security requirements, performing application security assessments, and providing developers with remediation guidance and advice. On any given day, the Principal Application Security Architect can be pulled in to evaluate a new system, review a proposed application change, or provide guidance on application security/coding best practices.
Leads architecture design evaluations and threat modelling of our products (cloud and on-prem). Recommends and implements products/services that support operational needs and security requirementsTechnical point of contact for product teams as it relates to automation, CI/CD, and remediation guidanceAssist in leading the design, development, and implementation of security tools, best practices and standards and ensure product development teams understand themPerform code analysis of applications, manually and using SAST, DAST, and SCA scanning solutions as well as conducting manual vulnerability analysisPromotes and contributes to the continuous improvement of security strategy and supports risk prioritizationHelps train and support team membersLeads the improvement of the accessibility of security through automation, continuous integration pipelines, and other meansEducate and mentor junior team membersEnsures program(s) is meeting intended purpose and metricsWhat’s needed to succeed (Minimum Qualifications):
Bachelors degree in STEM, Computer ScienceMinimum of 7 years of experience in related fieldExpert knowledge of OWASP Top 10Proficiency in threat modelingExpert knowledge of risk management methodologies and processesExpert knowledge in DevSecOps (e.g., CI/CD, IaC, PaC, CaC)Proficiency with security automation tooling and methods (e.g., TerraForm, Ansible, containerization, SBOM)Proficiency with application testing (e.g., SAST, DAST, MAST, Pen Test tooling)Proficiency with scripting (e.g., PowerShell, Python, Perl, BashProficiency with programming languages (e.g., Python, Java, .Net) and modern programming language structure (e.g., Object Oriented Programming, web framework)Proficiency with CI/CD technology stacks (e.g AWS, Harness, TeamCity, GitHub, Artifactory, CHEF, CloudWatch)Proficiency with Software Development Lifecycle processesProficiency with web and app security stack (e.g., API security)Proficiency with vulnerability management processes and providing remediation guidanceProficiency in the understanding of compliance frameworks (e.g., NIST 800-53, OWASP frameworks) and processesProficiency in cryptographyProficient knowledge of IAM (i.e., authentication and authorization)Proficient understanding of networks and network security (e.g., WAF, Micro-segmentation)Proficient in risk management methodologiesProficient in cloud technologiesAbility to work independently and self-motivateExcellent problem solving, critical thinking, interpersonal, collaboration, written and verbal communication skills
Certified Information Systems Security Professional (CISSP), or equivalentMust be legally authorized to work in the United States for any employer without sponsorshipSuccessful completion of interview required to meet job qualificationReliable, punctual attendance is an essential function of the positionWhat will help you propel from the pack (Preferred Qualifications):
Masters degreeCertified Ethical Hacker (CEH)GIAC Security Essentials (GSEC)Certified Information Security Manager (CISM)Comp TIA Security Certified Secure Software Lifecycle Professional (CSSLP)Certified Information Systems Auditor (CISA)Systems Security Certified Practitioner (SSCP)CompTIA Advanced Security Practitioner (CASP )Offensive Security Certified Professional (OSCP)Minimum of 12 years of experience in related field, including any combination of the following: threat modeling, secure coding, mobile and API security, identity management and authentication, software design and evelopment, cryptography, system administration and network security, cloud computingProficiency with application penetration testing to demonstrate and test exploitability of vulnerabilitiesProficiency in waterfall and agile development processes and ability to integrate secure development practices into both modelsSuccess in implementing effective Secure SDLC frameworks across a large corporationProficient knowledge of cloud security infrastructure technologies (e.g., containerization, service mesh, micro-services)Proficient in LLM/GenAI technologiesProficient in mobile development technologiesPost expiration date: 10/6/2025
What’s needed to succeed (Minimum Qualifications):
Bachelors degree in STEM, Computer ScienceMinimum of 7 years of experience in related fieldExpert knowledge of OWASP Top 10Proficiency in threat modelingExpert knowledge of risk management methodologies and processesExpert knowledge in DevSecOps (e.g., CI/CD, IaC, PaC, CaC)Proficiency with security automation tooling and methods (e.g., TerraForm, Ansible, containerization, SBOM)Proficiency with application testing (e.g., SAST, DAST, MAST, Pen Test tooling)Proficiency with scripting (e.g., PowerShell, Python, Perl, BashProficiency with programming languages (e.g., Python, Java, .Net) and modern programming language structure (e.g., Object Oriented Programming, web framework)Proficiency with CI/CD technology stacks (e.g AWS, Harness, TeamCity, GitHub, Artifactory, CHEF, CloudWatch)Proficiency with Software Development Lifecycle processesProficiency with web and app security stack (e.g., API security)Proficiency with vulnerability management processes and providing remediation guidanceProficiency in the understanding of compliance frameworks (e.g., NIST 800-53, OWASP frameworks) and processesProficiency in cryptographyProficient knowledge of IAM (i.e., authentication and authorization)Proficient understanding of networks and network security (e.g., WAF, Micro-segmentation)Proficient in risk management methodologiesProficient in cloud technologiesAbility to work independently and self-motivateExcellent problem solving, critical thinking, interpersonal, collaboration, written and verbal communication skills
Certified Information Systems Security Professional (CISSP), or equivalentMust be legally authorized to work in the United States for any employer without sponsorshipSuccessful completion of interview required to meet job qualificationReliable, punctual attendance is an essential function of the positionWhat will help you propel from the pack (Preferred Qualifications):
Masters degreeCertified Ethical Hacker (CEH)GIAC Security Essentials (GSEC)Certified Information Security Manager (CISM)Comp TIA Security Certified Secure Software Lifecycle Professional (CSSLP)Certified Information Systems Auditor (CISA)Systems Security Certified Practitioner (SSCP)CompTIA Advanced Security Practitioner (CASP )Offensive Security Certified Professional (OSCP)Minimum of 12 years of experience in related field, including any combination of the following: threat modeling, secure coding, mobile and API security, identity management and authentication, software design and evelopment, cryptography, system administration and network security, cloud computingProficiency with application penetration testing to demonstrate and test exploitability of vulnerabilitiesProficiency in waterfall and agile development processes and ability to integrate secure development practices into both modelsSuccess in implementing effective Secure SDLC frameworks across a large corporationProficient knowledge of cloud security infrastructure technologies (e.g., containerization, service mesh, micro-services)Proficient in LLM/GenAI technologiesProficient in mobile development technologiesPost expiration date: 10/6/2025