Match score not available

Staff Security Engineer, Detection and Response

Remote: 
Full Remote
Salary: 
150 - 265K yearly
Experience: 
Senior (5-10 years)
Work from: 

Offer summary

Qualifications:

Bachelor's degree in Information Security, Computer Science, Computer Engineering, or relevant experience, At least 7 years of consistent response experience in enterprise SaaS environments, Adept knowledge of cyber threat landscape, cloud environments and programming languages like Python.

Key responsabilities:

  • Develop and expand detection capabilities across multiple platforms
  • Enhance security monitoring and operational tasks while maintaining compliance
  • Drive integration of new tools, services and maintenance of automated playbooks
  • Support incident response program and key security initiatives
  • Create standard procedures, documentation and enforce quality of services
TripActions logo
TripActions Large https://navan.com/
1001 - 5000 Employees
See more TripActions offers

Job description

The Staff Security Engineer, Detection and Response you will be responsible for the detection strategy, creation, tuning, validation, and correlation to ensure that we have effective detections in place against an ever-changing threat landscape. This role is hands-on, carrying the responsibility of running the day-to-day security operations tasks including management of SIEM, detection engineering platform and helping incident response. 

Reporting into the Director of Security Engineering, the ideal candidate will maintain and enhance a consistent and reliable operational security environment and take a proactive security monitoring approach.This role has high visibility and requires a technical individual who can partner with stakeholders and cross-functional teams (Engineering, Product, SRE, IT, Legal, etc) and has the ability to adapt in a dynamic security landscape. 


What You’ll Do:

  • Responsible for building and expanding detection capabilities across a variety of platforms
  • Responsible for security event monitoring, management and response, workflows and tasks
  • Improve security monitoring and operational tasks by developing measurement capabilities and metrics to track and communicate performance, coverage and risk
  • Evaluate existing SIEM rules, filters, events and use cases and adapt them to meet the business requirements
  • Mature security operations; drive integration of new log sources, tools and services
  • Create, maintain and manage a library of automated playbooks to address new threats and tactics employed by attacker
  • Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives
  • Build and maintain tools to proactively monitor and respond to emerging threats
  • Assist the Security Incident Response Program with related matters resulting from security investigations
  • Participate in key security initiatives as the Subject Matter Expert to ensure alignment with strategies and roadmap
  • Develop standard operating procedures and other appropriate documentation to enforce quality and consistency of services being delivered
  • Support ongoing security compliance, audit, and certification programs (e.g., PCI, HIPAA, SOC2)

What We’re Looking For:

  • Bachelor's degree in Information Security, Computer Science, Computer Engineering, or equivalent work experience
  • Minimum 7 years of consistent detection & response experience performing triage/incident response in enterprise SaaS environments
  • Expert knowledge of the cyber threat landscape – able to articulate and incorporate into program understanding of major threat categories, motivations, and intent of adversaries against enterprise assets
  • Experience in at least one programming language, Python, Go, C, C++. Alternatively deep expertise using low-code automation tools or SOAR platforms is a plus.
  • Experienced in driving monitoring and automation in cloud environments, preferably knowledge of AWS.
  • Strong understanding of advanced persistent threats, attacker methodologies, attack lifecycle, cyber kill chain, and the MITRE framework.
  • Understanding of digital forensics techniques and closely related areas.
  • Exceptional collaboration skills and communication skills, with the ability to engage with partners and stakeholders with a variety of perspectives and technical understanding
  • GIAC security certification such as GCIA, GCIH, GREM, GPEN (or equivalent), multiple preferred
    SaaS / FinTech / anti-fraud experience a plus
  • Automation first mindset
The posted pay range represents the anticipated low and high end of the compensation for this position and is subject to change based on business need. To determine a successful candidate’s starting pay, we carefully consider a variety of factors, including primary work location, an evaluation of the candidate’s skills and experience, market demands, and internal parity.

For roles with on-target-earnings (OTE), the pay range includes both base salary and target incentive compensation. Target incentive compensation for some roles may include a ramping draw period. Compensation is higher for those who exceed targets. Candidates may receive more information from the recruiter.
Pay Range
$150,000$265,000 USD

Required profile

Experience

Level of experience: Senior (5-10 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Communication
  • Collaboration

Security Engineer Related jobs