
Security Operations Engineer
Salary undisclosed
Checking job availability...
Original
Simplified
- Help build and maintain HRT's security detection and response program to protect our data and intellectual property from both internal and external threats
- Build and maintain end-to-end pipelines to ingest, parse, map, enrich, visualize, and analyze raw logs from disparate sources
- Hunt for, detect, and respond to malicious activity and anomalous events on HRT's devices and networks
- Perform digital forensics and incident response (DFIR) tasks during security incidents
- Assist with third party vendor security posture reviews
- Collaborate closely with our end user support team on investigations, vulnerability scanning across endpoints and responding to end user issues and software approval requests
- Maintain and enhance HRT's data loss prevention rules
- Foster strong cross-functional relationships with HRT's global teams and external vendors
- Analyze network activity and forensic artifacts to identify and remediate malicious activity
- 5+ years of experience in cyber security, with specific experience in security operations and detection engineering
- Experience with threat detection and threat hunting, preferably using automation
- Python programming experience
- Experience using log analysis platforms such as ELK and Splunk; Elastic Certified Engineer certification is a plus
- Experience with Linux (Debian is a huge plus), Windows, and macOS
- Experience in performing network analysis with artifacts such as PCAPs, NetFlow, and network logs
- Willingness to work an on-call rotation during business hours and one weekend per month
- Help build and maintain HRT's security detection and response program to protect our data and intellectual property from both internal and external threats
- Build and maintain end-to-end pipelines to ingest, parse, map, enrich, visualize, and analyze raw logs from disparate sources
- Hunt for, detect, and respond to malicious activity and anomalous events on HRT's devices and networks
- Perform digital forensics and incident response (DFIR) tasks during security incidents
- Assist with third party vendor security posture reviews
- Collaborate closely with our end user support team on investigations, vulnerability scanning across endpoints and responding to end user issues and software approval requests
- Maintain and enhance HRT's data loss prevention rules
- Foster strong cross-functional relationships with HRT's global teams and external vendors
- Analyze network activity and forensic artifacts to identify and remediate malicious activity
- 5+ years of experience in cyber security, with specific experience in security operations and detection engineering
- Experience with threat detection and threat hunting, preferably using automation
- Python programming experience
- Experience using log analysis platforms such as ELK and Splunk; Elastic Certified Engineer certification is a plus
- Experience with Linux (Debian is a huge plus), Windows, and macOS
- Experience in performing network analysis with artifacts such as PCAPs, NetFlow, and network logs
- Willingness to work an on-call rotation during business hours and one weekend per month