Principal Architect - Application Cybersecurity (Remote)

Other Jobs To Apply

Connecting People. Uniting the World. There's never been a more exciting time to join United Airlines! As a global company that operates in hundreds of locations around the world - with millions of customers and tens of thousands of employees - we have a unique responsibility to uplift and provide opportunities in the places where we work, live and fly.

We're on a path to becoming the best airline in aviation history. Join our Cybersecurity and Digital Risk (CDR) team to help lead the industry in cyber safety, security and resilience. United's CDR team plays a critical role in protecting our operations by enabling secure and resilient systems, managing threats and vulnerabilities, and ensuring swift response and recovery. Our mission is to seamlessly embed cybersecurity and digital risk management into every aspect of our business. We help drive progress and growth through trusted digital solutions, safeguarding assets and empowering our team, all while promoting a cyber-safe and secure environment that supports resilient airline operations.

United offers a competitive benefits package aimed at keeping you happy, healthy, and well-traveled. From employee-run "Business Resource Group" communities to world-class benefits like parental leave, 401(k), and privileges like space-available travel, United is truly a one-of-a-kind place to work. Are you ready to travel the world and help us keep our airline cyber safe? Apply today!

Job overview and responsibilities


The Principal Architect - Application Cybersecurity validates that our services, applications, and websites are designed and implemented in accordance with United's secure development standards. The Principal Architect is a senior level position that works closely with development teams, product teams, and other teams across the organization to design and develop security solutions/applications and integrate security into the product lifecycle from design through deployment.

The Principal Architect is a recognized subject matter expert in defining security requirements, performing application security assessments, and providing developers with remediation guidance and advice. On any given day, the Principal Application Security Architect can be pulled in to evaluate a new system, review a proposed application change, or provide guidance on application security/coding best practices.

  • Leads architecture design evaluations and threat modelling of our products (cloud and on-prem). Recommends and implements products/services that support operational needs and security requirements
  • Technical point of contact for product teams as it relates to automation, CI/CD, and remediation guidance
  • Assist in leading the design, development, and implementation of security tools, best practices and standards and ensure product development teams understand them
  • Perform code analysis of applications, manually and using SAST, DAST, and SCA scanning solutions as well as conducting manual vulnerability analysis
  • Promotes and contributes to the continuous improvement of security strategy and supports risk prioritization
  • Helps train and support team members
  • Leads the improvement of the accessibility of security through automation, continuous integration pipelines, and other means
  • Educate and mentor junior team members
  • Ensures program(s) is meeting intended purpose and metrics

What's needed to succeed (Minimum Qualifications):

  • Bachelor's degree in STEM, Computer Science
  • Minimum of 7 years of experience in related field
  • Expert knowledge of OWASP Top 10
  • Proficiency in threat modeling
  • Expert knowledge of risk management methodologies and processes
  • Expert knowledge in DevSecOps (e.g., CI/CD, IaC, PaC, CaC)
  • Proficiency with security automation tooling and methods (e.g., TerraForm, Ansible, containerization, SBOM)
  • Proficiency with application testing (e.g., SAST, DAST, MAST, Pen Test tooling)
  • Proficiency with scripting (e.g., PowerShell, Python, Perl, Bash
  • Proficiency with programming languages (e.g., Python, Java, .Net) and modern programming language structure (e.g., Object Oriented Programming, web framework)
  • Proficiency with CI/CD technology stacks (e.g AWS, Harness, TeamCity, GitHub, Artifactory, CHEF, CloudWatch)
  • Proficiency with Software Development Lifecycle processes
  • Proficiency with web and app security stack (e.g., API security)
  • Proficiency with vulnerability management processes and providing remediation guidance
  • Proficiency in the understanding of compliance frameworks (e.g., NIST 800-53, OWASP frameworks) and processes
  • Proficiency in cryptography
  • Proficient knowledge of IAM (i.e., authentication and authorization)
  • Proficient understanding of networks and network security (e.g., WAF, Micro-segmentation)
  • Proficient in risk management methodologies
  • Proficient in cloud technologies
  • Ability to work independently and self-motivate
  • Excellent problem solving, critical thinking, interpersonal, collaboration, written and verbal communication skills

  • Certified Information Systems Security Professional (CISSP), or equivalent
  • Must be legally authorized to work in the United States for any employer without sponsorship
  • Successful completion of interview required to meet job qualification
  • Reliable, punctual attendance is an essential function of the position

What will help you propel from the pack (Preferred Qualifications):

  • Master's degree
  • Certified Ethical Hacker (CEH)
  • GIAC Security Essentials (GSEC)
  • Certified Information Security Manager (CISM)
  • Comp TIA Security
  • Certified Secure Software Lifecycle Professional (CSSLP)
  • Certified Information Systems Auditor (CISA)
  • Systems Security Certified Practitioner (SSCP)
  • CompTIA Advanced Security Practitioner (CASP )
  • Offensive Security Certified Professional (OSCP)
  • Minimum of 12 years of experience in related field, including any combination of the following: threat modeling, secure coding, mobile and API security, identity management and authentication, software design and evelopment, cryptography, system administration and network security, cloud computing
  • Proficiency with application penetration testing to demonstrate and test exploitability of vulnerabilities
  • Proficiency in waterfall and agile development processes and ability to integrate secure development practices into both models
  • Success in implementing effective Secure SDLC frameworks across a large corporation
  • Proficient knowledge of cloud security infrastructure technologies (e.g., containerization, service mesh, micro-services)
  • Proficient in LLM/GenAI technologies
  • Proficient in mobile development technologies

Post expiration date: 10/31/2025

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...