Enable job alerts via email!

Specialist, Security Engineering & Threat Management

Crypto.com

United States

Remote

USD 80,000 - 120,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An innovative firm is seeking an intermediate-level security specialist to join their Global Cybersecurity Services Team. This role involves enhancing a cutting-edge security technology stack and contributing to AI-driven security automation workflows. You'll engage in threat management, security operations, and collaborate with cross-functional teams to ensure a robust security posture. If you have a passion for cybersecurity and a knack for automation, this is an exciting opportunity to make a significant impact in a dynamic environment.

Qualifications

  • 5-7 years of experience in Information Security with hands-on technical skills.
  • Experience in applying AI/ML in cybersecurity use cases.

Responsibilities

  • Conduct threat alert reviews and investigations, performing root cause analysis.
  • Build and enhance security operations technology stack and automate workflows.

Skills

Information Security
Security Engineering
Cyber Threat Intelligence
Digital Forensics
Incident Response
Scripting Languages
Attention to Detail

Tools

SIEM
EPP/EDR/XDR
SOAR
Threat Intelligence Platforms
Open Source Threat Intelligence
AWS
Azure
GCP

Job description

We are looking for an intermediate level security specialist to join our Global Cybersecurity Services Team. As part of our modern cybersecurity operating model, the role will be engaged in enhancing our security technology stack, building AI driven security automation workflows and contributing to security operations and threat management.

We are building a modern, multi-cloud, intelligence driven security operations capability that will heavily involve AI and automation; and will require engineering and operational skills at all levels.

Responsibilities
  • Threat Alert Reviews and Investigations - deep dive into alerts sent to security operations, performing log review and root cause analysis. Proficient in performing investigations using open source and proprietary tools, including but not limited to - EPP/EDR/XDR software, Digital Forensics tools/software, SIEM platforms, etc.
  • Security Engineering - Build, maintain and enhance our security operations technology stack, which includes next generation SIEM and SOAR solutions. Build and enhance security logging and detection engineering practices, manage the detection use case life cycle. Relentlessly automate and creatively incorporate AI into workflows.
  • Threat Intelligence Collection - Gather and analyze data from diverse sources, including OSINT, dark web forums, commercial feeds and internal telemetry.
  • Threat Analysis - Assess threat actor capabilities, motivations, TTPs; perform targeted attack analysis, attribution analysis and recommend improvements for the global security program and/or specific security control domains.
  • Making Threat Intelligence Actionable - Translate intelligence (operational/tactical/strategic) into actionable outputs.
  • Collaboration & Incident Support - Partner with other security stakeholders to contextualize threats, provide CTI insights during incidents and prioritize defensive actions.
  • Security Projects - Lead projects and initiatives that may involve - Endpoint Security enhancements, Threat Hunting, Compromise Assessments, Network/Endpoint security reviews, etc.
  • Leadership - Be comfortable with cross-functional leadership and stakeholder management. Be willing to mentor and contribute to the growth and capability of the team.
Requirements
  • 5-7 years of experience in Information Security, with technical hands-on experience in Security Engineering, Security Operations, Cyber Threat Intelligence, Security Engineering, Digital Forensics, Incident Response, Endpoint Security or Cloud Security.
  • Working Experience with SIEM, EPP/EDR/XDR, SOAR, Threat Intelligence Platforms (TIPs), Open Source Threat Intelligence solutions (eg. MISP, OpenCTI, etc).
  • Working experience with Cloud environments like AWS, Azure and GCP.
  • Working experience in Cyber Threat Intelligence roles (Analyst, Engineer, Consultant).
  • Working experience in the practical implementation of operational, tactical and strategic threat intelligence.
  • Experience in applying AI/ML in cybersecurity use cases.
  • Experience in using scripting languages to automate tasks and manipulate data or programming experience.
  • Highly self-motivated, attention to detail and outcome driven.
  • Proficiency in verbal and written English.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.