Palo Alto Networksposted about 1 month ago
$123,000 - $200,000/Yr
Full-time • Mid Level
Santa Clara, CA

About the position

As Staff SOC Security Engineer, you will join a team of analysts and engineers who protect the enterprise that aims to protect the world from cyberattacks. In this role, you will quickly become an expert in Palo Alto Networks security products; primarily XDR, XSIAM, Next Generation Firewalls and Prisma Cloud. You will also provide feedback to the engineering teams to continually improve our world leading security products. Many SOCs are drowning in false positive alerts, but Palo Alto Networks SOC changed the game and re-invented how Security Operations should function. Our vigilant focus on automation, prevention and high-fidelity alerts enables our analysts to be more proactive. You will not spend your day sifting through alerts. Instead, your day will be split evenly between (1) analyzing and responding to high fidelity alerts (2) proactive threat hunting and (3) contributing to a variety of different projects aligned to your personal interests. Continuous learning is also key to our Security Operations team’s philosophy. We offer many channels for learning to ensure our teammates are up to speed with the latest TTPs.

Responsibilities

  • Monitor and analyze alerts to confirm security incidents
  • Perform analysis of true positive alerts to determine root cause and impact
  • Own and lead individual incident response activities by analyzing security alerts and coordinating responses
  • Perform in-depth event review and analysis where appropriate
  • Analyze events, research the potential cause, and recommend a course of action
  • Hunt for indications of compromise across multiple technology platforms
  • Continuously improve our alerting use cases and the threat hunting program
  • Collaborate with SOC Automation team to automate tedious, boring activities
  • Contribute to proof-of-concept assessments of new security products
  • Generate reports detailing security incidents for security leaders and the business
  • Show off your excellent communication skills in post mortem reviews of incident response activities, to facilitate continuous improvement
  • Research security trends with the goal of improving our own processes and tools

Requirements

  • Minimum 4+ years working in a Security Operations role
  • Familiarity with the principles of network and endpoint security, current threat and attack trends, and have a working knowledge of security principles such as defense in depth
  • Familiarity with performing security Incident Response activities in complex organizations
  • Familiarity in at least one of the following three core areas: Endpoint Detection and Response (EDR) or Endpoint Forensics, Network Log Analysis, Public Cloud Defense (AWS, GCP etc)
  • Threat hunting experience
  • Hands-on working knowledge of a SIEM
  • Excellent analytical and problem solving skills
  • Strong communication skills, both spoken and written
  • Strong familiarity with technologies commonly seen in Enterprises (i.e. AD, Kubernetes, VMs etc)
  • Bachelor's degree from four-year college or university or equivalent training, education, and experience in information / cyber security, computer systems, IT, etc. or equivalent military experience required

Benefits

  • FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees
  • Mental and financial health resources
  • Personalized learning opportunities
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service