First American

Senior Security Engineer – Cyber Defense

First American

full-time

Posted on:

Location Type: Hybrid

Location: Santa AnaCaliforniaUnited States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $112,400 - $149,800 per year

Job Level

Tech Stack

About the role

  • Analyze threat intelligence data to understand adversary tactics, techniques, and procedures (TTPs).
  • Rapidly analyze threat intelligence information within the context of the organization to assess potential risks, impact, and prioritize Security Incidents or important threat intelligence.
  • Conduct threat hunting activities to identify and mitigate cyber threats.
  • Collaborate with internal teams to enhance threat detection and response capabilities.
  • Monitor and analyze security alerts from various sources to identify potential threats.
  • Provide recommendations for improving security posture based on threat intelligence and hunt findings.
  • Act as a senior technical resource in developing processes to proactively monitor, detect, and respond to security threats, including the ongoing refinement and enhancements of security controls and configurations for security monitoring systems.
  • Monitor information security systems, alerts and indicators of compromise used to protect the network from attacks and identify compromised systems.
  • Collaborate with Incident Responders to identify, develop, and implement incident response processes and procedures to mitigate security risks.
  • Lead, develop, and mature the cyber threat intelligence function of the SOC.
  • Identify, advise and contribute to system and alert tuning to ensure security related events are properly prioritized and addressed.
  • Contribute to the ongoing development and enhancement of Cyber Threat Intelligence handling and associated CTI playbooks.
  • Contribute to the execution activities in the areas of security risk identification, analysis, classification, and mitigation strategies.
  • Advise customers on security requirements, internal security policies, and security best practices.
  • Provide training and support related to security incidents, intelligence, and requests to other members on the team.
  • Identify/receive problem, research alternatives, prepare analysis and determine best remediation actions to address issues at hand.
  • Conduct risk assessments, interview internal and external customers to gain technical knowledge of security/compliance requirements.
  • Develop and maintain threat intelligence reports and briefings; research and analyze data, report trends and vital information to management/business partner.
  • Keep abreast of industry advancements and incorporate that knowledge into daily work activities.
  • Research and stay abreast of emerging technologies, new vulnerabilities and exploits that may compromise internal systems.
  • Track, analyze, and report security metrics and propose counter measures to address security trends that are not in line with company’s desire risk profile.
  • Contribute to the evaluation, testing and implementation of new security systems and processes.
  • Assist internal audit and disaster recovery activities as needed.
  • Develop and maintain documentation for all assigned responsibilities.
  • Required to perform duties outside of normal work hours based on business needs.

Requirements

  • Familiar working in a Security Operations Center (SOC) environment, using and analyzing alerts from various systems such as SIEM, Cloud Services, Email Security Gateways, Endpoint Security.
  • Knowledge of query languages for the purposes of AD-Hoc threat hunting, confirming detection controls, and deploying new use cases in response to emerging threats.
  • Understanding of operational security best practices and use of common security technologies.
  • Experience in implementing Information Security technologies and/or processes.
  • Experience collecting, analyzing, and actioning cyber threat intelligence.
  • Experience delivering cyber threat intelligence briefings to various audiences.
  • Experience in product evaluations and analysis.
  • Generally, requires a BS Degree in Computer Science, Information Technology, Telecommunications, or Electrical Engineering, or equivalent work experience.
  • Must have minimum 5+ years information security experience.
  • 2+ years of consecutive hands-on experience working in a SOC environment, utilizing industry leading network security monitoring technologies, application, web, database and Security Event and Information Management (SIEM), IDS/IPS, endpoint, email security gateways and DLP technologies.
  • Certifications: Security+, GIAC, CEH, OSCP, CISSP preferred.
Benefits
  • medical
  • dental
  • vision
  • 401k
  • PTO/paid sick leave
  • employee stock purchase plan
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
threat intelligence analysisthreat huntingincident responserisk assessmentsecurity metrics trackingquery languagesinformation security technologiescyber threat intelligence briefingssecurity event managementsecurity controls enhancement
Soft Skills
collaborationcommunicationleadershipproblem-solvingtraining and supportanalytical thinkingadaptabilitycustomer advisoryprocess developmentdocumentation
Certifications
Security+GIACCEHOSCPCISSP