Recent Searches

You haven't searched anything yet.

1 Sr. Security Incident Management and Response Automation Engineer Job in Durham, NC

SET JOB ALERT
Details...
Synopsys
Durham, NC | Full Time
$101k-122k (estimate)
7 Days Ago
Sr. Security Incident Management and Response Automation Engineer
Synopsys Durham, NC
$101k-122k (estimate)
Full Time | Civic & Environmental Advocacy 7 Days Ago
Save

sadSorry! This job is no longer available. Please explore similar jobs listed on the left.

Synopsys is Hiring a Sr. Security Incident Management and Response Automation Engineer Near Durham, NC

Job Description And RequirementsSr. Security Incident Management and Response Automation EngineerAt SIG, Synopsys’ Software Integrity Group, we are enthusiastic learners and seasoned inventors. We are makers and visionaries who make technology safer. We are innovators who develop the best solutions to keep your software safe. Whether you’re selling it directly to your customers or relying on it to run your operations, SIG helps you protect your bottom line by building trust in your software—at the speed your business demands. We embrace diversity as a company, so we can create solutions that serve not just technology but the humans behind it.
The Cybersecurity team is seeking a passionate, experienced, and collaborative practitioner to be a key member of our security operations team.
The Sr. Security Incident Management and Response Automation Engineer improves security event detection capabilities and leads response automation efforts across diverse security tooling and enterprise operating environments. This individual contributor monitors threats, trends, and attack patterns, partnering with security operations center analysts and business stakeholders to create relevant, actionable security content representations while balancing the need for high-fidelity detections and false positive reduction.
Key Responsibilities
  • Leads content building, tuning, and content lifecycle management using a variety of SIEM, endpoint, network, and cloud security tools
  • Guides research and keeps current on the latest emerging threats, attack patterns, and adversaries
  • Works closely with security analysts and SOC staff to refine detections and reduce false positives
  • Learns about business initiatives, products, and attack surface to drive relevant security detections
  • Partners with stakeholders to drive improvements in technology and policy governance
  • Leads threat intelligence-gathering activities and conduct hypothesis-driven threat-hunting activities
Qualifications
  • Strong written and verbal communication skills; ability to establish and maintain strong working relationships with other functional groups
  • Demonstrates experience building security content for a variety of detection technologies such as Network and Host Intrusion Detection Systems (IDS), Endpoint Detection and Response (EDR), and SIEM
  • Possesses knowledge of a variety of threats, malicious actor personas, attack patterns, exploits, and common vulnerabilities
  • Understands the MITRE ATT&CK Frameworks, Cyber Kill Chain, and Diamond Model concepts
  • Has prior experience as an incident responder, a security operations analyst, or security engineer
  • Demonstrates and understanding of current and emerging security threats
  • Prior experience conducting and leading threat-hunting activities
  • Proficient with Regular Expressions (RegEx), SQL queries, YARA rules, network packet analysis, and JSON
  • Understanding of common attack patterns and Indicators of Compromise (IoCs) across Windows, MacOS, and Linux-based operating systems
  • Hands-on experience conducting data ingestion, parsing, normalization, and building alerting rules using an enterprise-grade SIEM solution (e.g., Elastic, Splunk, QRadar, SumoLogic, etc.)
  • Malware analysis experience and reverse-engineering skills
  • Experience creating scripts using Python or similar languages
  • Experience in incident investigations and response, computer forensics preferred
  • Thorough understanding of foundational operating system and networking concepts, including standard protocols such as TCP, HTTPS, SSH, RDP, etc.
  • 7 years in an incident response role or working in or with a security operations center
  • 5 years of experience in evaluating, deploying, and managing endpoint, network, and cloud security tooling
  • Bachelor’s degree in information security, computer science, or a related field or equivalent combination of education, training, and experience
  • Holds or is willing to obtain job-related security certifications
  • Fluent in English
About The Synopsys Software Integrity GroupSynopsys Software Integrity Group helps organizations build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in application security, provides static analysis, software composition analysis, and dynamic analysis solutions that enable teams to quickly find and fix vulnerabilities and defects in proprietary code, open-source components, and application behavior. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
For more information, go to www.synopsys.com/software.
Synopsys considers all applicants for employment without regard to race, color, religion, sex, gender preference, national origin, age, disability, or status as a Covered Veteran in accordance with federal law. In addition, Synopsys complies with applicable state and local laws prohibiting discrimination in employment in every jurisdiction in which it maintains facilities. Synopsys Inc. also provides reasonable accommodation to individuals with a disability in accordance with applicable laws.
The base salary range across the U.S. for this role is between $137,000-$205,000. In addition, this role may be eligible for an annual bonus, equity, and other discretionary bonuses. Synopsys offers comprehensive health, wellness, and financial benefits as part of a of a competitive total rewards package. The actual compensation offered will be based on a number of job-related factors, including location, skills, experience, and education. Your recruiter can share more specific details on the total rewards package upon request.
Job CategoryInformation Technology
CountryUnited States
Job SubcategoryIT Security
Hire TypeEmployee
Base Salary Range$137,000-$205,000

Job Summary

JOB TYPE

Full Time

INDUSTRY

Civic & Environmental Advocacy

SALARY

$101k-122k (estimate)

POST DATE

06/19/2024

EXPIRATION DATE

06/22/2024

WEBSITE

synopsys.com

HEADQUARTERS

IRVINE, CA

SIZE

15,000 - 50,000

FOUNDED

1986

TYPE

Public

CEO

MAHA HAIDER

REVENUE

$3B - $5B

INDUSTRY

Civic & Environmental Advocacy

Related Companies
About Synopsys

Synopsys helps technology companies develop electronic products and software by providing electronic design automation for design and verification of silicon chips, as well as providing tools for software quality and security testing.

Show more

Synopsys
Full Time
$93k-117k (estimate)
Just Posted
Synopsys
Full Time
$143k-175k (estimate)
Just Posted
Synopsys
Full Time
$220k-249k (estimate)
Just Posted