Senior Incident Response Engineer
Updated on 11/6/2023
Woven

1,001-5,000 employees

Developing next-generation vehicles for universal mobility society
Company Overview
Woven by Toyota, based in Chuo-ku Tokyo, is a forward-thinking company dedicated to the development of next-generation cars and the realization of a mobility society, focusing on safety, freedom, and happiness for all. They utilize advanced tools and technologies such as their vehicle software OS and platform, Arene, and Automated Driving/Advanced Driver Assistance Systems to ensure efficient development and deployment of high-quality vehicle software. The company's commitment to safety and improvement is evident in their construction of Woven City, a test course for mobility that encourages collaboration and invention, and their ongoing efforts to integrate mobility with social systems.
Automotive & Transportation

Company Stage

Seed

Total Funding

$35.6M

Founded

2020

Headquarters

Chuo City, Japan

Growth & Insights
Headcount

6 month growth

11%

1 year growth

11%

2 year growth

11%
Locations
London, UK
Experience Level
Entry
Junior
Mid
Senior
Expert
Desired Skills
AWS
Bash
Google Cloud Platform
PowerShell
Microsoft Azure
Operating Systems
Splunk
Terraform
Python
Communications
CategoriesNew
IT & Security
Software Engineering
Requirements
  • 5+ years or more of demonstrated experience in security operations and incident response
  • Practical experience in network- and host-based digital forensics across multiple operating systems
  • In-depth experience working with a variety of monitoring tools, including SIEM, endpoint security, intrusion detection/prevention, packet analysis, CASB, and SOAR
  • Knowledge of open security testing standards and projects, including OWASP and the MITRE ATT&CK Matrix
  • Excellent written communication skills, with a focus on translating technically complex issues into simple, easy-to-understand concepts in English
Responsibilities
  • Respond to alerts and handle digital forensics
  • Continuously improve our monitoring systems' detection and response capabilities as well as processes, procedures, and playbooks
  • Plan and execute monitoring system architectural changes
  • Lead Incident Response efforts when dealing with confirmed security incidents
  • Automate analysis and response steps to reduce manual toil
  • Help prioritize the creation of new SOC use cases to ensure optimum ROI for engineering effort
  • Communicate effectively at multiple levels of sensitivity, and multiple audiences
  • Recognize, adopt and instill the best practices in security engineering fields throughout the organization: development, cryptography, network security, security operations, incident response, security intelligence
  • 3 days per week in-office
  • Rotating primary on-call coverage during local business hours
  • Rotating weekend on-call coverage (once a quarter)
Desired Qualifications
  • Experience leading the deployment of a major SIEM platform (Splunk, QRadar, Sentinel, ArcSight, etc) and/or EDR platform (Crowdstrike, Defender for Endpoint, Cylance, etc)
  • Experience with malware analysis and reverse engineering
  • 7+ years of experience in cyber security and adjacent fields such as systems engineering, network management, cloud security, and/or application security
  • 2+ years in a security engineering leadership position
  • 2+ years of scripting/coding experience with one or more languages
  • Relevant industry certifications, a degree in cyber security or adjacent fields, or cyber security boot camps
  • Experience in python, powershell, bash
  • Experience with an Infrastructure as Code tool like terraform
  • Familiarity with cloud platforms like AWS, Azure or GCP