Full-Time

Insider Threat

Security Engineer

Confirmed live in the last 24 hours

X

X

1,001-5,000 employees

Consumer Software
Fintech
AI & Machine Learning
Entertainment

Compensation Overview

$127k - $297kAnnually

+ Equity

Junior, Mid

Palo Alto, CA, USA + 1 more

More locations: San Jose, CA, USA

Location can be either Palo Alto or San Jose.

Category
Cybersecurity
IT & Security
Required Skills
Python
SQL
JIRA
Splunk
Linux/Unix
Requirements
  • Bachelor’s degree in Computer Science/Engineering, or relatable experience/certificates (GIAC Certified Forensic Analyst (GCFA), GIAC Cyber Threat Intelligence (GCTI), GIAC Certified Forensic Examiner (GCFE))
  • Coding proficiency in Python & SQL
  • Experience in commercial Endpoint Detection Response (EDR), Security Orchestration Automation Tools (SOAR), and a familiarity with security automation workflows
  • Networking and system administration experience of server and operating systems (macOS, Linux, Windows)
  • Experience in Gsuite Administration, and JIRA. Familiar with multiple commercial & open-source forensic tools to perform analysis and/or memory collection
  • Experience in data ingestion in Splunk, Clickhouse, Grafana, and simple storage service, as well as dashboard creation.
  • Experience with anomaly detection applicable to the insider threat detection space
  • 1- 2+ years incident response experience and/or insider threat experience
  • 1- 2+ years of cybersecurity operational experience
Responsibilities
  • Triage and analysis of all incoming detection alerts from a variety of tools in our tech stack
  • Work closely with the Insider Threat engineering and investigations team to understand current threats and gaps
  • Escalate appropriate threats to Insider Threat investigators
  • Develop/tune detections to best protect X
  • Improve our capabilities to effectively detect and respond to internal threats and security incidents
  • Possess an automation-first mindset
  • Leverage threat modeling and analysis to build event and/or behavioral based detections to protect our critical assets and infrastructure
  • Perform analysis of logs from a variety of sources (e.g., endpoint logs, application logs, network traffic logs) to identify potential insider threats
  • Perform actions that auto-resolve false positives and provide context scaling our ability to investigate
  • Identify gaps in our infrastructure, and work with software engineers, analysts, investigators, and stakeholders to gain visibility through logging and detection
  • Perform live response, digital forensics, and analysis of a wide variety of assets including endpoints, mobile, servers and networking equipment
  • Conduct insider threat investigations in a cross-functional environment and drive incident resolution

Company Stage

Acquired

Total Funding

$739.4M

Headquarters

San Francisco, California

Founded

2006

Growth & Insights
Headcount

6 month growth

-11%

1 year growth

-25%

2 year growth

-66%
Simplify Jobs

Simplify's Take

What believers are saying

  • X's Bitcoin holdings have significantly increased its stock value by 400% this year.
  • X's strategic Bitcoin acquisitions position it as a leader in cryptocurrency investment.
  • X's market performance benefits from Bitcoin's price surge from $67,000 to $108,000.

What critics are saying

  • Bitcoin's price volatility poses financial risks to X's heavy investment strategy.
  • X's reliance on Bitcoin could lead to instability if cryptocurrency markets crash.
  • Regulatory scrutiny on cryptocurrency investments may impact X's future operations.

What makes X unique

  • X's focus on Bitcoin acquisition sets it apart from traditional tech firms.
  • X's strategic shift to cryptocurrency aligns with emerging digital asset trends.
  • X's inclusion in Nasdaq-100 highlights its growing influence in the tech sector.

Help us improve and share your feedback! Did you find this helpful?