Incode Technologies is hiring: Senior Security Engineer in San Francisco
Incode Technologies, San Francisco, CA, United States
The Opportunity We are looking for a trustworthy and proactive Senior Security Engineer to be the technical thought leader and driver of holistic security operations across Incode. As an early security hire at Incode, you will work across the security operations lifecycle for detection engineering and incident response, influence the security operations program development and be the first line of defense through assessing threats, collecting, analyzing data, and responding to anomalous activities and events. In close collaboration with our security team members, the compliance team, SRE team, and product engineering teams, we share the responsibility to identify, protect, detect, respond, and recover from cyber threats. If you are a hands–on Sr. Security Engineer passionate about building high signal detection strategies, conducting threat–hunting exercises, automating and enriching events, and leading our first line of defense across our corporate and product at Incode, we would love to chat with you. This is an exciting opportunity to shape and build security operations and influence our overall security strategy. Responsibilities Be the first line of defense to protect, detect, respond to, and recover from cyber–attacks in both our corporate and product environments. Develop and run tools to gather security telemetry data from cloud production systems. Automate workflows and improve identification and response time for security events. Build and optimize high signal detections with enriched data and orchestration. Define and improve processes, procedures, and technologies used for detection and response. Develop runbooks and incident playbooks for new and existing detections and influence our security operations roadmap. Lead threat hunting practices, suggest product and infrastructure signals to surface attacks and incorporate findings into security controls. Research attacker tactics, techniques, and procedures (TTPs) and craft detections to quickly identify and contain potential security threats. Respond to security events, triage, perform investigations, incident analysis, and communicate clearly and efficiently with partners. Participate in an on–call rotation. Onboard new systems and services to SIEM and SOAR and build new detection pipelines. Facilitate incident response processes and tabletop exercises. Qualifications: Experience as a security engineer, including security monitoring, detection engineering, incident response, and threat hunting in a SaaS company Experience developing tools and automation using common DevOps toolsets and programming languages Practical understanding of common attacks, adversary tactics, techniques, and procedures (TTPs) and MITRE ATT&CK principles Operating systems internals and forensics experience for macOS, Windows & Linux Domain experience managing and working with current SIEM and SOAR platforms, DLP, email security platforms, endpoint protection platforms, secure service edge, etc. Understanding of malware functionality and persistence mechanisms Ability to analyze endpoint, network, and application logs for anomalous events Practical understanding of scripting or programming in at least one language Excellent collaborative skills Outstanding written and verbal communication Preferred Experience and Certification: SaaS Startup experience in security focused industries, such as fintech, security software and services, healthtech, identity and access management. Hands–on experience with data analysis, modeling, and correlation at scale Familiarity in continuous integration and Infrastructure as Code Experience designing, and optimizing high throughput ETL pipelines Possess a breadth of knowledge and experience across the information security domain, such as endpoint security, cloud security, application security, or automation Experience as a software engineer, infrastructure engineer, or site reliability engineer Experience detecting or responding to threats in Kubernetes (K8s), AWS, and Linux environments Proficiency in programming in at least one high–level programming language (polyglot preferred) Certifications in Security, Incident Handling, Forensics, and/or Offensive Security (eg. CERT–CSIH, GCIH, GCIA, GCFA, Security+, ECIH, GX–IH, OSCP, GPEN, CEH, CISSP etc). #J-18808-Ljbffr