Cyber Security Engineer - Incident Response, SaaS

Excellent opportunity for an Incident Response or SecOps Engineer. Work remotely for a leading SaaS as the first member of their US SOC Team

  • Charlotte, NC
  • $160,000 - $190,000
Easy Apply Now

A bit about us:

We are looking for a hands-on, dynamic and fast paced Cyber Security Incident Response Team Manager, CSIRT. In this role you will be responsible for responding to security threats facing the company. You will help further develop the incident response program and automation that protects JFrog today and tomorrow. An ideal candidate is an experienced, highly motivated leader that embraces the opportunity to influence and evangelize security across the organization.

Why join us?

We’re reinventing DevOps to help the world’s greatest companies innovate -- and we want you along for the ride. This is a special place with a unique combination of brilliance, spirit and just all-around great people. Here, if you’re willing to do more, your career can take off. And since software plays a central role in everyone’s lives, you’ll be part of an important mission. Thousands of customers trust us to manage, accelerate, and secure their software delivery from code to production.

Job Details

Day to Day:
Deliver accurate and timely security investigations and responses (Tier 1-2)
Perform incident triage by determining scope, urgency, and potential impact thereafter identifying the specific vulnerability while recommending actions for expeditious remediation
Partner with teams in the company to drive holistic and comprehensive fixes for systemic issues
Identify new security threats by conducting continuous monitoring, vulnerability assessments and log analysis
Provide On-call security support as needed

US Citizenship or green card/permanent residency - A must!
2+ years in incident response team
5+ years information security hands-on experience, preferably as part of SOC/IR (tier 1/2)
Prior SaaS experience
Ability to take decisions and manage critical incidents under pressure
Proven experience with investigating cloud security incidents on AWS/GCP/Azure following well-known industry standards/framework/benchmark (MITRE, NIST, CIS or equivalent)
In-depth understanding of SIEM technology (ELK)
Proven experience with creating incident response workflows, processes and playbooks with defined SLAs and reflecting it to company’s stakeholders (e.g. Executive management)
Proven experience with automating security flows (SOAR) and threat intelligence
Ability to lead projects such as security controls evaluation and integration

Preferred experience:
Knowledge on securing/monitoring containerized environments (Docker, K8s) - An advantage
Familiarity with multiple regulation and compliance standards such as ISO27001, FedRAMP, FIPS , SOC 2.0, GDPR, HIPAA)
Experience with FedRAMP and its requirements
Ability to work effectively with a global team
Excellent interpersonal skills with the ability to engage and discuss technical and business risk caused by security issues with business and legal partners at all levels
Easy Apply Now
Easy Apply Now
Job Details
Managed by Jobot Pro
Job Type
$160,000 - $190,000