Calendly
The scheduling automation platform for eliminating the back-and-forth emails to find the perfect time — and so much more
Security Operations Engineer
Security OperationsSecurity OperationsFull TimeRemoteTeam 501-1,000Since 2013H1B No SponsorCompany SiteLinkedIn
Location
United States
Posted
27 days ago
Salary
$155.8K - $219.9K / year
3 yrs expEnglishAWSCloudCyber SecurityFirewallsGoogle Cloud PlatformLinuxMac OSPythonSplunk
Job Description
• Collaborating with Security Operations Center (SOC) team members to monitor, detect, and respond to cybersecurity threats in a timely manner.
• Responding to cybersecurity incidents from identification through resolution.
• Developing and maintaining up-to-date knowledge of the threat landscape, as well as advancements in cybersecurity technologies and methodologies.
• Identifying, configuring and onboarding security telemetry sources/logs in support of threat detection and incident response
• Collaborating with Engineering and SRE to identify and mitigate logging deficiencies
• Developing new detection scenarios and queries to broaden and deepen the team’s detection coverage
• Tuning and continuously improving existing detection queries to increase signal-to-noise ratio, and ensure our detections remain relevant and functional
• Executing and improving incident response protocols and procedures to swiftly and effectively manage security incidents.
• Identifying, developing and maintaining automation solutions to increase the efficiency and effectiveness of the team
• Integrating various security and IT tools to enhance threat detection, incident response, and operational efficiency.
• Conducting regular security assessments, threat hunts, and continuous monitoring to identify vulnerabilities, opportunities for posture enhancements and better incident preparedness.
• Collaborating with Engineering, IT and other departments to support the implementation and evangelization of established cybersecurity best practices across the organization.
• Leveraging JIRA for creating and managing dashboards, reports, and metrics that support cybersecurity operations and decision-making.
Job Requirements
- A minimum of 3 years of experience in cybersecurity, with at least 2 years dedicated to security operations, a SOC environment and enterprise security.
- Demonstrated experience in incident response, including developing and implementing incident response playbooks and procedures, acting as incident commander on low severity incidents, and conducting post-incident analysis.
- Experience with JIRA or similar tools for creating dashboards, managing reports, and automating workflows to support cybersecurity operations.
- Proven track record in threat detection
- Strong knowledge in operating and configuring SIEM tools (e.g., Splunk, ELK) for real-time threat monitoring and analysis.
- Solid understanding of security technologies such as EDR (Endpoint Detection and Response), firewalls, and vulnerability scanners.
- Demonstrated track record of automating SOC processes, enhancing threat detection, or streamlining incident response using Python
- Proficient knowledge of threat actor behaviors, techniques and tools
- Experience investigating security events on MacOS, Linux and Windows systems
- Experience investigating security events in cloud environments including AWS and/or GCP
- Authorized to work lawfully in the United States of America as Calendly does not engage in immigration sponsorship at this time.
Benefits
- Top Performer Bonus program
- Equity awards
- Competitive benefits