Lead Security Operations Engineer
Detection & Response
Posted on 12/15/2022
INACTIVE
Klaviyo

1,001-5,000 employees

Growth marketing automation platform
Company Overview
Klaviyo's missions is to help companies retain customers and maximize their ROI. Klaviyo’s data–proven customer platform allows companies to send relevant, well–timed emails and SMS that increase lifetime values.
Consumer Software

Company Stage

N/A

Total Funding

$1.5B

Founded

2012

Headquarters

Boston, Massachusetts

Growth & Insights
Headcount

6 month growth

19%

1 year growth

35%

2 year growth

60%
Locations
Dorchester, Boston, MA, USA
Experience Level
Entry
Junior
Mid
Senior
Expert
Desired Skills
Bash
Microsoft Azure
Python
Ruby
Operating Systems
AWS
Splunk
Linux/Unix
Data Analysis
Google Cloud Platform
CategoriesNew
DevOps & Infrastructure
Software Engineering
Requirements
  • 8+ years of hands-on security operations experience in the modern cloud environments
  • Hands-on experience with SIEM and centralized logging (e.g., Splunk)
  • Experience securing cloud environments such as AWS, GCP, and/or Azure
  • Experience leveraging scripting languages to automate or build features (Bash, Python, Go and/or Ruby)
  • Understand techniques, tools and procedures used by bad actors
  • Subject matter expert in the areas of incident response and analysis of security events
  • Experience with Security Orchestration, Automation, and Response (SOAR)
  • Strong fundamentals of Linux and Mac operating systems
  • Demonstrate strong understanding of: Threat Detection & Response in Cloud, Cloud Security, Operating System Security and IAM
  • Automation-first approach for all work performed
  • Strong oral and written communication skills
  • Team player with a strong, self-managing work ethic
Responsibilities
  • Detect, respond, and report on cyber threats and incidents using tools such as a SIEM, IDS, EDR, Firewalls and modern cloud platforms
  • Lead end-to-end security incident response investigations
  • Lead forensic investigations to include collection, preservation of evidence and analysis
  • Perform incident response activities to include host and network forensics, log analysis, malware analysis and more
  • Conduct ad-hoc threat hunts in support of SecOps, detection and response
  • Automate and codify detection and response processes and playbooks
  • Assist with developing threat detection signatures, analytics, and correlation rules
  • Mentor other engineers and members of the team
  • Work with various engineering stakeholders to identify gaps and recommendations to mitigate organizational risk