Senior IT Security Engineer, Threat Response

Orrick Herrington & Sutcliffe LLP
9d$150,000 - $201,600Remote

About The Position

Orrick currently has an excellent opportunity for a Senior IT Security Engineer, Threat Response. This position could be based in any of our U.S. offices and consideration given for 100% remote US locations. As a Threat Hunter, you will play a critical role in protecting Orrick by proactively identifying, investigating, and mitigating threats before they can cause harm. The Threat Hunter will work closely with our Security Operations Center (SOC), incident response teams, and other IT stakeholders to stay ahead of emerging threats and ensure the security of our digital assets. Incident Response: Collaborate with the incident response team to investigate and respond to security incidents, providing expert analysis and support. Proactive Threat Hunting: Conduct advanced threat hunting activities to detect unknown and sophisticated threats that have bypassed traditional security defenses. Data Analysis: Analyze security alerts, network traffic, endpoint logs, and other data sources to identify anomalies and potential threats. Threat Intelligence: Integrate threat intelligence data into response and hunting activities, ensuring that the organization is aware of and protected against emerging threats. Tool Development: Develop and refine custom scripts, queries, tools, and automation to enhance threat detection and hunting capabilities. Reporting: Document and report findings, including potential risks, vulnerabilities, and recommended remediation steps to key stakeholders. Collaboration: Work with other cybersecurity teams to improve detection rules, refine security policies, and enhance overall security posture. Continuous Improvement: Stay updated on the latest threat hunting techniques, tools, and best practices, and continuously improve the threat-hunting process. Additional security operations duties as requested. Who is Orrick? Orrick is a global law firm focused on delivering innovative solutions for four sectors: Technology & Innovation, Energy & Infrastructure, Finance and Life Sciences & HealthTech. Founded more than 150 years ago in San Francisco, Orrick today has offices in 25+ markets. We are recognized globally for delivering the highest-quality legal advice and for our culture of innovation and collaboration.

Requirements

  • Strong conceptual understanding of how computers, operating systems, and networks interact in an enterprise setting.
  • Experience with security monitoring tools and security analysis tools.
  • Experience integrating cyber threat intelligence Into security operations.
  • Ability to clearly document an investigation plan and findings.
  • Strong analytical and pragmatic problem-solving abilities.
  • Excellent business communication skills, both written and verbal.
  • Ability to work independently and as part of a team.
  • Consistent attention to detail.
  • Commitment to staying ahead of emerging threats.
  • Experience working in a Security Operations Center (SOC) environment.

Nice To Haves

  • Knowledge of malware analysis, digital forensics, or reverse engineering is a plus.
  • Certifications such as GIAC Certified Forensic Analyst (GCFA) or similar considered an asset.
  • Proficiency in Jupyter Notebooks or a willingness to quickly learn and apply the tool is a plus.

Responsibilities

  • Collaborate with the incident response team to investigate and respond to security incidents, providing expert analysis and support.
  • Conduct advanced threat hunting activities to detect unknown and sophisticated threats that have bypassed traditional security defenses.
  • Analyze security alerts, network traffic, endpoint logs, and other data sources to identify anomalies and potential threats.
  • Integrate threat intelligence data into response and hunting activities, ensuring that the organization is aware of and protected against emerging threats.
  • Develop and refine custom scripts, queries, tools, and automation to enhance threat detection and hunting capabilities.
  • Document and report findings, including potential risks, vulnerabilities, and recommended remediation steps to key stakeholders.
  • Work with other cybersecurity teams to improve detection rules, refine security policies, and enhance overall security posture.
  • Stay updated on the latest threat hunting techniques, tools, and best practices, and continuously improve the threat-hunting process.
  • Additional security operations duties as requested.

Benefits

  • We offer a full range of elective health benefits including medical, dental, vision and life; robust mental well-being programs; child, family, elder, and pet care benefits; short- and long-term disability and industry leading parental leave benefits, health savings account contributions (w/applicable medical plan), flexible spending accounts, and a 401K program.
  • This role will receive compensated time off through our Paid Time Off program, and paid holidays.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service