hero

Find jobs at planet-healing startups

Search jobs at hundreds of venture-backed climate tech companies across the portfolios of dozens of leading climate VCs

Information Security Engineer

Proterra

Proterra

IT
Greer, SC, USA
Posted on Nov 27, 2025

Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects, Proterra offers unique opportunities to grow, collaborate, and lead transformative change in the electrification of heavy-duty transportation and equipment.

Our commitment to innovation extends beyond our battery solutions to our people, where we create an environment where everyone feels valued, supported, and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity, valuing diverse perspectives and encouraging bold ideas, allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages, and opportunities to develop professionally.

Position Overview:

The Information Security Engineer will be responsible for developing, enhancing, and executing Information Security Operations at Proterra. In this position you will assist with the maintenance and implementation of IT security systems to protect Proterra’s corporate, manufacturing, cloud and IoT environments from cyber-attacks. You will maintain and lead incident response and escalations with our security operations center, be responsible for vulnerability management and participate in the creation or improvement of company security policies/ procedures. You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally, you will be assisting with evaluation, setup and utilization of new security products and technologies.

About the Role – You will:

  • Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
  • Work with cross functional teams to support security requirements to protect organization’s corporate, manufacturing, cloud and IoT environments from cyber-attacks.
  • Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.
  • Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
  • Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
  • Work with cross functional teams to support security requirements to protect organization’s corporate, manufacturing, cloud and IoT environments from cyber-attacks
  • Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.
  • Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
  • Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.
  • Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.
  • Participate in scheduled security assessment activities and projects to ensure industry compliance.
  • Initiate and maintain Security Incident Response Plan (SIRT) and After-Action Reports (AARs) to maintain operational continuity
  • Identify, analyze and interpret threat actors and malicious activity in client environments act upon and take the appropriate actions towards remediation and documentation.
  • Differentiate between potential intrusion attempts and pinpoint false alarms by working with EDR, Identity Protection and NextGen SIEM to develop resolution plans.
  • Perform 3rd party vendor assessments and fulfill Proterra security assessments requirements
  • Triage and respond to security events - serve as a primary responder for incidents, taking ownership of incidents and tracking through resolution.
  • Performs other related duties as assigned.

Your Experience Includes:

  • 3-5 years of related information technology infrastructure experience with identity and access management [IAM], SSO solutions including (SAML 2, OAuth 2, OIDC).
  • Some experience in securing enterprise networks, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., IPsec, SSL/TLS) heavy emphasis in SaaS apps such as Crowdstrike Falcon Complete, Netskope DLP, Nessus Tenable and asset management platforms such as Axionus.
  • Overall Knowledge of endpoint protection technologies (e.g., anti-malware, EDR, DLP), and experience in managing and securing workstations, mobile devices, and servers.
  • Have participated in penetration testing, vulnerability assessments, and red teaming exercises.
  • General understating of industry standards, compliance, and legal requirements (ISO 27001, FedRAMP, NIST 800-171, NIST 800-53, SOC2, etc.)
  • Excellent trouble-shooting abilities in software and hardware and be able to lead outage calls and trouble-shooting conversations until resolved and provide detailed root cause analysis reports.
  • Above average understanding in vulnerability reporting using Saas platforms such as Nessus Tenable.

Education:

  • Bachelor's degree in computer science, Information Security, Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.

Certifications:

  • CISSP, CASP+, SSCP+, or other relevant security certificates
  • Certified Ethical Hacking (CEH) CISSP, CISA
  • Network+, Security+, Linux+ or combination of similar certificates acceptable.

Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1-B, OPT, CPT, TN or any other employment sponsorship).

#LI-BJ1