
Staff Security Engineer, Threat Defense – Automation
Proofpoint
full-time
Posted on:
Location Type: Hybrid
Location: Draper • California, Utah • 🇺🇸 United States
Visit company websiteSalary
💰 $132,975 - $267,190 per year
Job Level
Lead
Tech Stack
AWSAzureCloudCyber SecurityGoogle Cloud PlatformPython
About the role
- Act as the Level 3 escalation point for high-severity security incidents within the global 24/7 SOC.
- Lead complex investigations into advanced cyber threats, including malware outbreaks, targeted attacks, and persistent threats.
- Provide expert-level guidance on containment, mitigation, and remediation strategies.
- Proactively hunt for hidden threats within enterprise networks using threat intelligence and behavioral analytics.
- Develop and refine threat detection rules to improve SOC visibility.
- Assess emerging threats and provide actionable recommendations to enhance security posture.
- Design and implement automated workflows to enhance security event triage and response.
- Leverage SOAR (Security Orchestration, Automation, and Response) platforms to streamline incident response.
- Work with SIEM (Security Information and Event Management) tools to optimize log ingestion and alerting mechanisms.
- Collaborate with security architects and engineers to enhance detection and response capabilities.
- Perform root cause analysis on security incidents and recommend improvements to security controls.
- Stay updated on industry best practices and evolving attack techniques to ensure effective defenses.
Requirements
- 12 yrs + hands-on experience in Cybersecurity Incident Response or Security Operations.
- Must be a US Citizen.
- Strong background in SOC operations, SIEM, threat intelligence, and digital forensics.
- Expertise in investigating malware, phishing, web attacks, insider threats, and advanced persistent threats (APTs).
- Experience working with security automation and orchestration tools (SOAR).
- Familiarity with scripting languages such as Python, PowerShell, or Bash for security automation.
- Strong understanding of MITRE ATT&CK framework, TTPs (Tactics, Techniques, and Procedures), and cyber kill chain.
- Hands-on experience with cloud security (AWS, Azure, GCP) is a plus.
- Certifications such as GCIH, GCFA, CISSP, CISM, or OSCP are highly desirable.
- Ability to work in a fast-paced, global environment and collaborate with cross-functional teams.
Benefits
- Competitive compensation
- Comprehensive benefits
- Career success on your terms
- Flexible work environment
- Annual wellness and community outreach days
- Always on recognition for your contributions
- Global collaboration and networking opportunities
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
Cybersecurity Incident ResponseSecurity OperationsThreat IntelligenceDigital ForensicsMalware InvestigationPhishing InvestigationWeb AttacksInsider ThreatsAdvanced Persistent ThreatsScripting (Python, PowerShell, Bash)
Soft skills
CollaborationFast-paced Work EnvironmentCross-functional Teamwork
Certifications
GCIHGCFACISSPCISMOSCP