Qualtrics-posted 3 months ago
Full-time • Mid Level
Hybrid • Provo, UT
Computing Infrastructure Providers, Data Processing, Web Hosting, and Related Services

At Qualtrics, we create software the world's best brands use to deliver exceptional frontline experiences, build high-performing teams, and design products people love. But we are more than a platform—we are the creators and stewards of the Experience Management category serving over 18K clients globally. Building a category takes grit, determination, and a disdain for convention—but most of all it requires close-knit, high-functioning teams with an unwavering dedication to serving our customers. When you join one of our teams, you'll be part of a nimble group that's empowered to set aggressive goals and move fast to achieve them. Strategic risks are encouraged and complex problems are solved together, by passing the mic and iterating until the best solution comes to light. You won't have to look to find growth opportunities—ready or not, they'll find you. From retail to government to healthcare, we're on a mission to bring humanity, connection, and empathy back to business. Join over 5,000 people across the globe who think that's work worth doing.

  • Performs Level 2/3 SOC/IR and shift lead duties as a part of a 24/7 security incident watch team in a multi-timezone follow-the-sun rotation.
  • Provides leadership, mentoring, and training to SOC/IR team personnel and to other Qualtrics stakeholders and the Qualtrics Information Security Team.
  • Provides onboarding training and coaching for junior SOC/IR Engineers.
  • Performs network and endpoint forensics to establish attack scope and root cause analyses.
  • Ensures communication and escalation of security activities to leadership.
  • Performs additional analysis of escalations from SOC engineers and conducts incident review.
  • Leads development of workflow automation to lower response time and eliminate lengthy response times.
  • Develop and improve attack remediation strategies, incident handling processes, standard operating procedures, playbooks, and automations.
  • Identifies alerting gaps and develops strategies to increase threat detection coverage.
  • Support FedRamp, ISO27001, SOC, HITRUST, and other audit activities for security operations and incident response.
  • Minimum of a BS degree, preferably in IT Engineering, Computer Science, or any other IT-related field of study.
  • 3-5 years of experience in the Information Security field.
  • 2-5 years of prior SOC and/or Incident Response experience.
  • Experience performing analysis utilizing IDS/AV/Firewall consoles.
  • Experience performing analysis using EDR technologies.
  • Experience with cloud computing and AWS services.
  • Experience with Multiple Operating Systems with a System Administrator level skill set on MacOS and Linux.
  • Strong understanding of networking and associated protocols.
  • Development skills including scripting (e.g. Python, shell scripting).
  • Experience with MITRE ATT&CK and Cyber Kill Chain, including Tactics, Techniques, and Procedures (TTPs).
  • Knowledge of STIX/TAXII, SIGMA, DISA STIGs.
  • Work life integration with frequent office events, team outings, and happy hours.
  • Creative office design with rooftop views and an open collaborative workspace.
  • Standard benefits package including medical, dental, vision, life insurance, etc.
  • Snacks, drinks, and free lunches in the office.
  • Hybrid work model with in-office days and flexibility to work remotely.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service