AI Security Engineer (US Based) at AspenView Technology Partners
United States
<meta><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="font-size:12pt;white-space:pre-wrap;">About the role</strong></b></p><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><span style="white-space:pre-wrap;">Establish and operationalize security controls for emerging Artificial Intelligence and Machine Learning capabilities across the enterprise. This role is responsible for embedding security into AI solution design, protecting AI models and data pipelines, and enabling secure adoption of AI use cases across business and technology functions. </span></p><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><span style="white-space:pre-wrap;">The role works closely with Digital, Data, AI, Security Architecture, Engineering, and Cyber Defense Operations teams to define secure AI architecture patterns, implement guardrails, and ensure AI platforms operate within client’s cybersecurity, risk, and governance standards. The ideal candidate combines strong cybersecurity engineering capability with practical knowledge of AI platforms, model risks, and enterprise technology integration.</span></p><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><br></p><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:12pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="font-size:12pt;white-space:pre-wrap;">What you will do:</strong></b></p><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="white-space:pre-wrap;">AI Security Architecture & Engineering</strong></b></p><ul data-pattern="discCircleSquare" data-depth="1" style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;margin:8px 0px;line-height:1.6;padding:0px 0px 0px 32px;list-style-type:disc;"><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Define secure architecture patterns for AI and machine learning solutions, ensuring protection of models, training pipelines, inference environments, and supporting data flows.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Establish secure integration patterns for AI services across enterprise applications, APIs, cloud platforms, and data environments.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Review AI solution designs to ensure alignment with enterprise security architecture standards and secure-by-design principles.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Support implementation of secure controls across AI development, testing, deployment, and production environments.</span></li></ul><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="white-space:pre-wrap;">AI Risk Management & Security Controls</strong></b></p><ul data-pattern="discCircleSquare" data-depth="1" style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;margin:8px 0px;line-height:1.6;padding:0px 0px 0px 32px;list-style-type:disc;"><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Identify, assess, and mitigate AI-specific threats including model poisoning, prompt injection, adversarial attacks, unauthorized model access, data leakage, and misuse of AI outputs.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Define and implement security guardrails for AI model access, API usage, prompt controls, and secure interaction with enterprise data sources.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Establish controls to protect sensitive training data, embeddings, prompts, and inference outputs across AI workflows.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Support validation of third-party AI services and external model integrations from a cybersecurity risk perspective.</span></li></ul><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="white-space:pre-wrap;">Governance, Standards & Responsible AI Enablement</strong></b></p><ul data-pattern="discCircleSquare" data-depth="1" style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;margin:8px 0px;line-height:1.6;padding:0px 0px 0px 32px;list-style-type:disc;"><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Establish AI security standards, engineering guardrails, and governance practices aligned with regulatory requirements, enterprise risk expectations, and responsible AI principles.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Partner with Digital and AI teams to enable secure AI use cases where security accelerates responsible business adoption rather than acts as a blocker.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Support creation of AI security review checkpoints for new AI initiatives, pilots, and production deployments.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Contribute to enterprise AI security policies, reference architectures, and operational standards.</span></li></ul><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="white-space:pre-wrap;">Operational Security & Monitoring</strong></b></p><ul data-pattern="discCircleSquare" data-depth="1" style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;margin:8px 0px;line-height:1.6;padding:0px 0px 0px 32px;list-style-type:disc;"><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Collaborate with Cyber Defense Operations to operationalize AI-related detection, monitoring, and response capabilities.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Support development of monitoring use cases for AI misuse, abnormal model behavior, unauthorized access, and suspicious data movement.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Define logging and telemetry requirements for AI platforms to improve visibility and incident readiness.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Support integration of AI platform telemetry into enterprise detection and monitoring tools where applicable.</span></li></ul><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="white-space:pre-wrap;">Cross-Functional Collaboration</strong></b></p><ul data-pattern="discCircleSquare" data-depth="1" style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;margin:8px 0px;line-height:1.6;padding:0px 0px 0px 32px;list-style-type:disc;"><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Work closely with Security Architecture, Cloud Engineering, Data teams, Application teams, and AI program owners to ensure consistent security adoption.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Support security reviews for AI vendors, AI-enabled SaaS platforms, and internally developed AI capabilities.</span></li><li style="font-size:11pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Provide technical guidance to project teams on secure AI implementation and operational controls.</span></li></ul><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><br></p><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:12pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="font-size:12pt;white-space:pre-wrap;">What you bring:</strong></b></p><ul data-pattern="discCircleSquare" data-depth="1" style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;margin:8px 0px;line-height:1.6;padding:0px 0px 0px 32px;list-style-type:disc;"><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">5–8 years of cybersecurity engineering or security architecture experience, with exposure to cloud security, data protection, or application security.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Experience working with enterprise AI, machine learning, analytics platforms, or datadriven technology environments.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Practical understanding of AI/ML deployment patterns, APIs, model lifecycle, and enterprise data integration.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Experience with Microsoft Azure AI services, OpenAI integrations, Databricks, or enterprise AI platforms preferred.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Familiarity with emerging AI governance frameworks and responsible AI standards.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Experience with Secure AI controls embedded into enterprise AI initiatives without slowing adoption.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Clear visibility into AI-related cyber risks and mitigation actions and ability to translate emerging AI risks into practical engineering controls.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Practical AI guardrails established for data, model access, and operational use.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Strong alignment between AI innovation, enterprise security, and regulatory expectations.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Security certifications such as CISSP, CCSP, or cloud security certifications preferred.</span></li></ul><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="white-space:pre-wrap;">Security Engineering Skills:</strong></b></p><ul data-pattern="discCircleSquare" data-depth="1" style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;margin:8px 0px;line-height:1.6;padding:0px 0px 0px 32px;list-style-type:disc;"><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Strong understanding of cybersecurity controls across cloud, applications, APIs, identity, and data protection.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Familiarity with AI/ML risks including prompt injection, model abuse, data leakage, and adversarial techniques.</span></li><li style="font-size:12pt;margin:3px 0px;letter-spacing:0.25px;line-height:1.6;text-align:justify;"><span style="white-space:pre-wrap;">Knowledge of secure architecture principles for modern digital and AI platforms.</span></li></ul><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:11pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><br></p><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:12pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><b><strong style="color:rgb(0,0,0);font-size:12pt;white-space:pre-wrap;">Equal Opportunity Employer:</strong></b></p><p style="font-family:"Basel Grotesk",Arial,sans-serif;font-size:12pt;font-weight:400;line-height:1.6;letter-spacing:0.25px;margin:4px 0px;padding:0px;text-align:justify;"><span style="color:rgb(0,0,0);font-size:12pt;white-space:pre-wrap;">AspenView is proud to be an equal opportunity employer. We believe in creating an environment where all employees feel welcome, valued, and empowered to succeed. We celebrate diversity and strive to build a culture of inclusion where all individuals, regardless of their race, color, gender, gender identity or expression, sexual orientation, disability, age, or any other characteristic, can thrive. We encourage applicants from all walks of life to join our team and make a lasting impact.</span></p>
Apply Now