.Company Description**100% REMOTE**:- MUST BE in UK, Canada, Mexico****MUST BE AVAILABLE TO WORK 2PM-10PM BST/GMT**Turnitin is your partner in education with integrity. Turnitin's originality checking and authorship investigation services ensure academic integrity, promote critical thinking, and help students improve their authentic writing. Turnitin provides instructors with the tools to prevent plagiarism, engage students in the writing process, and provide personalized feedback. Turnitin is used by more than 30 million students at 15,000 institutions in 140 countries. Turnitin is headquartered in Oakland, Calif., with international offices in Newcastle, U.K., Utrecht, Netherlands, Melbourne, Australia, Seoul, Korea and throughout Latin America.We are searching for people who demonstrate a passion for education and technology, are collaborative and entrepreneurial in spirit, and who can contribute to our continuing success and growth. In return, Turnitin offers a great benefits package and provides challenging and inspiring work.**Job Description**:We are looking for someone who brings passion, security experience, attention to detail, and the willingness to continuously learn. You will work within the Information Security & Compliance team and report directly to the Information Security Manager where you will have an opportunity to shape the security operations function for the global leader in educational technology. If you are passionate about security and have the desire to work for a mission-based company we would love to hear from you.The Principal Security Engineer position is a hands-on role that requires a high level of technical expertise. Responsible for a broad range of tasks including a mix of daily operational tasks as well as strategic planning, engineering, and operational functions. This position requires proficient in scripting, well-versed in technical security engineering, operations, and management of information security tools and processes such as Incident Response (IR), Security Information and Event Management (SIEM), Intrusion Detection System (IDS), Cloud Security Posture Management (CSPM), Data Loss Prevention (DLP), Vulnerability Management, Identity and Access Management (IAM), Privileged Access Management (PAM), Endpoint Security, file integrity monitoring, vulnerability and risk assessment, penetration testing, malware analysis, digital forensics, and encryption