Job Description

Summary

Gemini is looking for a Senior Security Engineer, Threat Detection & Response to join our growing information security team.

In this role, you will be part of the team responsible for designing, building, and automating detection, response and intelligence gathering solutions, developing unique and creative detection mechanisms, monitoring security events, and leading responses to any security incidents.Responsibilities

  • Own individual security solutions throughout their lifecycle, including design, development, and deployment, in order to continuously improve Geminis ability to detect and respond to advanced, targeted threats
  • Develop and improve processes and tools that supports the team rapidly iterating and responding to threats Gemini faces
  • Engage in incident response and investigation efforts
  • Analyze technical threat data to extract TTPs, malware techniques, and adversary methods
  • Create and enhance countermeasures and detections for malware, attacker techniques, threat actor methodology, and suspicious events associated with intelligence obtained by the Gemini Team
  • Produce well documented, resilient and manageable code that supports the streamlining and automation of the above
  • Provide mentorship and guidance to junior engineers on the team in their growth and implementation of the above

Minimum Qualifications

  • Significant DFIR/Threat Detection and Response experience
  • Scripting proficiency in a common programming language (e.g. Python, Go)
  • Hands-on familiarity with CI/CD, infrastructure as code, and microservices
  • Aptitude in the use of containerization technologies (eg. Docker)
  • Experience in the design and implementation of detection signatures spanning multiple security log sources (Splunk, EDR, etc.)
  • Able to troubleshoot and debug issues, and demonstrate a methodical approach to root cause analysis
  • Excellent oral and written communication skills, including the ability to interact effectively with leadership, engineers, vendors and peers

Preferred Qualifications

  • Familiarity in the use of container orchestration systems (e.g. Kubernetes)
  • Experience applying CI/CD concepts to the development and deployment of security detection mechanisms and tools
  • Understanding of ETL and Workflow engines (e.g. Argo Workflows, Airflow)
  • Experience in host and memory forensics (including live response) for Windows, OSX, and / or Linux
  • Experience with the analysis of new log and data sources and methodically incorporating them into a detection pipeline
  • Practical experience applying analysis frameworks (e.g Kill Chain, ATT&CK, etc)
  • Experience in automating any of the above using existing APIs and tools

It Pays to Work HereThe Compensation & Benefits Package For This Role Includes

  • Competitive starting salary
  • A discretionary annual bonus
  • Long-term incentive in the form of a new hire equity grant
  • Comprehensive health plans
  • 401K with company matching
  • Annual Learning & Development stipend
  • Paid Parental Leave
  • Flexible time off

Salary Range: The base salary range for this role is between $136,000 - $190,000 in New York City, the State of California and the State of Washington. This range is not inclusive of our discretionary bonus or equity package. When determining a candidates compensation, we consider a number of factors including skillset, experience, job scope, and current market data.

Skills
  • Communications Skills
  • Data Security
  • Security System Management
© 2024 cryptojobs.com. All right reserved.