Match score not available

Security Incident Response Engineer

Remote: 
Full Remote
Contract: 
Experience: 
Entry-level / graduate
Work from: 

Offer summary

Qualifications:

At least two years of experience in security incident response, Strong understanding of MITRE ATT&CK Framework, Experience with digital forensic tools and techniques.

Key responsabilities:

  • Support incident response strategy and tooling
  • Maintain SOC alert lifecycle and run retrospectives
  • Maintain communication during major cyber incidents
New Relic, Inc. logo
New Relic, Inc. Computer Software / SaaS Large https://newrelic.com/
1001 - 5000 Employees
See more New Relic, Inc. offers

Job description

Your opportunity
New Relic’s Information Security Team is searching for a Security Incident Response Engineer! If you enjoy a work environment where you're part of a successful distributed team that collaborates to achieve successful outcomes, we would love to talk to you! In this role, you will use your background and deep understanding of how attackers gain access to systems and apply it to respond to cyber security incidents covering all phases including identification, containment and eradication.

As an engineer of our growing Security Response team, you will collaborate with teams throughout the organization, providing security insight, mitigation strategies, and preventive measures from detections. You will help develop our security program through collaboration, investigation, documentation, and engineering practices.

What you'll do

  • Support and maintain response strategy and tooling to severe incidents and key attack scenarios.
  • Support the SOC alert lifecycle: triage security risk, investigate alerts, develop runbooks, policies and procedures to help the company respond, and run retrospectives to coordinate effort across the company to prevent future incidents.
  • Maintain healthy working relationships with our managed security service providers and respond to incident escalations.
  • Maintain coordination and communication streams horizontally and vertically as part of major cyber related incident handling.
  • Know the latest APT tactics and techniques and use engineering practices to detect and respond.
  • Provide technical expertise to engineering teams on standard methodologies, tools and frameworks.
  • Work with product managers, senior management, and end users to drive security maturity across the business.


This role requires

  • You have at least two years of recent experience working in a threat hunting, threat intelligence, incident response, SOC analyst or security engineering role
  • Experience configuring security incident and event management tools, including creating event filtering, correlation rules, and reports
  • Strong understanding of the MITRE ATT&CK Framework
  • Experience performing risk assessment, threat tracking, or vulnerability management and success in evaluating and communicating severity, impact, and likelihood of a risk to a wide audience
  • Familiarity with digital forensic tools and techniques for hands-on response during incidents
  • Be flexible to work on weekend shifts and avail weekly offs during weekdays
  • Be available for on call support during off hours


Bonus points if you have

  • Experience creating SOAR workflows and automation
  • Experience building a successful SOC or developing incident response plans or runbooks
  • Software engineering experience, primarily in Python or other high-level programming language
  • Experience in cloud detections (AWS, Azure, GCP)
  • Experience with DevOps CI/CD pipelines including Terraform, Atlantis, Ansible, Kubernetes, and Argo
  • Experience with enterprise Kubernetes deployments, including EKS


Fostering a diverse, welcoming and inclusive environment is important to us. We work hard to make everyone feel comfortable bringing their best, most authentic selves to work every day. We celebrate our talented Relics’ different backgrounds and abilities, and recognize the different paths they took to reach us – including nontraditional ones. Their experiences and perspectives inspire us to make our products and company the best they can be. We’re looking for people who feel connected to our mission and values, not just candidates who check off all the boxes.

If you require a reasonable accommodation to complete any part of the application or recruiting process, please visit https://newrelic.avature.net/accommodations to submit your request.

Our hiring process

Please note that visa sponsorship is not available for this position.

In compliance with applicable law, all persons hired will be required to verify identity and eligibility to work and to complete employment eligibility verification. Note: Our stewardship of the data of thousands of customers’ means that a criminal background check is required to join New Relic.

Headhunters and recruitment agencies may not submit resumes/CVs through this website or directly to managers. New Relic does not accept unsolicited headhunter and agency resumes, and will not pay fees to any third-party agency or company that does not have a signed agreement with New Relic.

New Relic is proud to be an equal opportunity employer. We foster a diverse, equitable, and inclusive environment, free from all types of discrimination, so our Relics can thrive. We hire people with different backgrounds, experiences, abilities and perspectives.

Candidates are evaluated based on qualifications, regardless of race, religion, ethnicity, national origin, sex, sexual orientation, gender expression or identity, age, disability, neurodiversity, veteran or marital status, political viewpoint, or other legally protected characteristics.

Review our Applicant Privacy Notice at https://newrelic.com/termsandconditions/applicant-privacy-policy.

Required profile

Experience

Level of experience: Entry-level / graduate
Industry :
Computer Software / SaaS
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Incident Response Analyst Related jobs