Salesforce

Information Security Principal, Environment Threat Assessment

Salesforce

full-time

Posted on:

Location Type: Hybrid

Location: San FranciscoCaliforniaVirginiaUnited States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $197,300 - $313,700 per year

Job Level

About the role

  • Conducting threat modeling for infrastructure and application-level threat scenarios, including security architecture, system interactions, and new products/features from a realized threat and “outside-in” perspective.
  • Utilizing threat intelligence, incident response data, detection and logging metrics, and visibility from proprietary security tooling to conduct and correlate research.
  • Assessing cloud security controls and cloud architecture implementations across current businesses and future M&As, primarily across AWS, GCP, and Azure substrates.
  • Analyzing logs from endpoint, network, and other security tooling to identify potential gaps in coverage or hunting for bypassing of existing controls.
  • Engaging executive stakeholders across the company to translate assessments into actionable recommendations that shape the business and our products.
  • Driving uplifts identified from security incidents with Product and Enterprise Security partners and serving as an SME for Product teams during design solutioning.
  • Providing strategic and tactical applied threat insights to Security and leadership stakeholders by contextualizing threat intelligence in the Salesforce context in partnership with our Threat Intelligence team.
  • Collaborating with architects and principals across Cyber Security operations, including Threat Detection and Data Science, to design alerting against realized threats.

Requirements

  • 12+ years of experience in threat modeling and security architecture, and/or other CSOC functions like Incident Response, Threat Detection, Threat Intelligence.
  • Significant understanding of threat actor tactics and offensive strategies.
  • Strong research and analytical skills with the ability to correlate data from various sources.
  • Experience using threat modeling and analysis frameworks such as Cyber Kill Chain, Diamond Model, MITRE ATT&CK, and STRIDE.
  • In-depth knowledge of cloud security and cloud architecture fundamentals.
  • Proficiency in analyzing logs from various security tools.
  • Familiarity with application security, specifically with the OWASP Top 10 vulnerabilities.
  • Strong understanding of common exploitation and abuse threats observed across for SaaS and PaaS providers.
  • Excellent communication skills, both written and oral.
  • A related technical degree required.
Benefits
  • time off programs
  • medical
  • dental
  • vision
  • mental health support
  • paid parental leave
  • life and disability insurance
  • 401(k)
  • employee stock purchasing program
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
threat modelingsecurity architectureincident responsethreat detectionthreat intelligencecloud securitylog analysisCyber Kill ChainMITRE ATT&CKOWASP Top 10
Soft Skills
research skillsanalytical skillscommunication skills
Certifications
related technical degree