Monitor security events and alerting via our security tooling, including MSSP, SIEM, AI, and CSPM tooling, to identify and triage potential threats
Design, develop, implement, and maintain high-fidelity detection rules and alerts within SIEM and other security platforms (e.g., EDR, Cloud Security tools) based on threat intelligence, MITRE ATT&CK framework, and identified risks
Own the continuous tuning and optimization of existing detection logic to reduce false positives and improve detection efficacy
Respond to issues identified by our Cribl employees
Act as a security incident response lead, including leveraging and improving detection capabilities during investigations
Design, build, and manage security playbooks, incorporating detection engineering best practices
Conduct security assessments of corporate assets through vulnerability testing, threat hunts, and purple team activities, with a focus on identifying detection gaps and opportunities
Perform both internal and external security reviews of corporate properties e.g., the corporate website and enterprise applications
Lead security incident response tabletop exercises
Continue to evolve and champion the use of Cribl products in our security tech stack to enhance detection, analysis, and response capabilities
Collaborate with threat intelligence teams to integrate new indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) into detection strategies
Partner cross-functionally with Product Security, IT, and Legal teams to strengthen overall security posture
This position will require stand-by, on-call, or off-hours duties
Requirements
Provide knowledge and experience in working with modern security principles e.g. SIEM, security data lakes, detections as code, EDR, zero trust networking, and other security tooling, as well as demonstrated experience with incident response and management
Utilize a strong understanding of common attack frameworks (e.g., MITRE ATT&CK) and how to map detections to TTPs
Understanding of authentication and authorization schemes such as SAML, OpenID, OAuth2, and SCIM
Experience scripting/coding in at least one of the following languages: Python, NodeJS, Ruby, Bash
Proven ability to act as a technical subject matter expert on security, compliance, and assurance topics
Communicate ideas to technical and non-technical audiences
Comfortable with ambiguity, have a strong analytical acumen, self-motivated, able to work cross-functionally
We are a remote-first company and work happens across many time-zones – you may be required to occasionally perform duties outside your standard working hours
Experience with SIEM platforms like Panther is a plus and its detection capabilities
Familiarity with Wiz and cloud native security tooling for detection in AWS, Azure, or GCP
Relevant certifications in cloud security or incident response (e.g., SANS GIAC certifications)
Proven experience in developing, deploying, and maintaining detection rules (e.g., Sigma, YARA, Splunk SPL, KQL) across various security platforms
Tech Stack
AWS
Azure
Cloud
Google Cloud Platform
Node.js
Python
Ruby
Splunk
Benefits
Diversity drives innovation, enables better decisions to support our customers, and inspires change for the better.
We’re building a culture where differences are valued and welcomed, and we work together to bring out the best in each other.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which the candidate is applying.