Match score not available

SR LEAD INFORMATION SECURITY ENGINEER

extra holidays - extra parental leave - fully flexible
Remote: 
Full Remote
Experience: 
Senior (5-10 years)
Work from: 

Offer summary

Qualifications:

In-depth technical knowledge of adversary capabilities., Experience with OSINT methods for investigation., Strong analytical skills and programming knowledge., User-level experience in a Unix-based environment..

Key responsabilities:

  • Research latest threat attacker tools and techniques.
  • Conduct network analysis and forensic investigations.
Lumen Technologies logo
Lumen Technologies Large http://www.lumen.com
10001 Employees
See more Lumen Technologies offers

Job description

About Lumen

Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency. People power progress.

Lumen’s commitment to workplace inclusion and employee support shines bright. We’ve made the Newsweek 2024 Greatest Workplaces for Diversity list and achieved a perfect score of 100 on the Human Rights Campaign Corporate Equality Index (CEI) for the fifth consecutive year. Plus, we’re the top employer in the communications and telecom industry, ranking 12th overall across all industries in The American Opportunity Index.

We’re looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.

Legal Statement

In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.

The Role

Black Lotus Labs has an opening for a Senior Lead Security Engineer that will leverage Lumen’s unique visibility to hunt Advanced Persistent Threat actors (APTs) and scale discovery of evolving malicious threats. Our global visibility of one of the worlds largest and most interconnected IP backbones as well as our computing cluster present exciting opportunities to integrate machine learning and graph analytic techniques as we find new ways to hunt for threats across the internet. Black Lotus Labs has detected and disrupted key evolving threats at an internet scale for years.

This position will work alongside advanced security researchers, data engineers, and malware reverse engineers, and help mentor analysts, engineers, and data scientists to tackle evolving threats accelerated by technologies like our Hadoop ecosystem (HBase, HDFS, Spark, Kafka, AirFlow), Elasticsearch and Redis clusters, Docker using Docker Swarm, malware environment, and a network of honeypots.

This is a close-knit, experienced, amazingly smart team that you can be a part of and help build out. This is a remote/work-from-home opening as well – and we are looking to expand the team globally to expand our ability to protect the world’s most important networks.

The Main Responsibilities

  • Research latest threat attacker tools, techniques and procedures (TTPs) with a goal of automating detection.
  • Analyze attacks and use network, forensic and OSINT methods for investigation.
  • Contribute to the development of tactical solutions to support triage and deep-dive analysis of malicious artifacts surfaced by internal and external partners.
  • Conduct network analysis, forensic investigations and malware analysis to identify malicious activity and derive Indicators of Compromise (IOCs) and associated detection rules.
  • Work with team to scale analysis of evolving threats and tracking threat actors leveraging support from data science tools sets developed by data scientists at the Lab such as machine learning and graph analytics.
  • Set priority of what threats to analyze and how long to spend on them to maximize the team's impact.
  • Build and maintain trust relationships with other intelligence teams, law enforcement, and other outside groups.
  • Work as the team point-of-contact in a rotational cycle to triage incoming research-related events.
  • Contribute to the creation and dissemination of finished cyber threat intelligence products and briefings.
  • Overlap at least 10 hours per week with US working hours.

What We Look For In a Candidate

Desired candidates will have a strong background exhibiting:

  • In-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement the techniques to discover and track the adversaries of today and identify the attacks of tomorrow.
  • Experience using OSINT methods for investigation, including discovering novel threats in malware repositories.
  • Scripting experience with Python and familiarity with distributed computing.
  • Extensive experience hunting threat actors, and developing algorithms and techniques to identify new threats from large data sets.
  • Deep knowledge of network-based threats and identifying behaviors without attack payloads.
  • Strong analytical thinking and ability to quickly pick up new methods, tools and programming languages.
  • User-level experience in a Unix-based environment.
  • Familiarity with extracting data through SQL.
  • Strong writing skills to assist in sharing our knowledge with the public.
  • Demonstrable knowledge of several of the following areas: cybersecurity concepts, network protocols, firewalls, IDS/IPS systems, email security, endpoint security, network security, Windows/Linux/macOS systems, cyber threat hunting, malware analysis tools and techniques, cyber threat intelligence, common threat actor TTPs, application security concepts, cloud security fundamentals, Incident Response methodologies.

Well Experienced Candidates May Also Have The Following Skills

  • Experience with Spark and distributed computing teams, law enforcement, and other outside groups
  • Experience developing automation and analysis in Python-based environments.
  • Understanding of static or dynamic analysis of malware.
  • Ability to analyze large data sets and present conclusions drawn from them.
  • Ability to work with others in providing direction and assisting in learning new topics.

Preferred

  • Functional knowledge of machine learning and how it can be applied to data sets.
  • Public speaking experience and a willingness to share technical topics in public forum.

Compensation

What to Expect Next

Requisition #: 335429

Background Screening

If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page. Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.

Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.

Equal Employment Opportunities

We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.

Disclaimer

The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.

Required profile

Experience

Level of experience: Senior (5-10 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Public Speaking
  • Analytical Thinking
  • Teamwork
  • Communication

Security Engineer Related jobs