About Vector3
Vector3, Inc., is an incident response firm supporting TMHCC Cyber and Professional Lines Group (CPLG) Vector3 specializes in responding to Business Email Compromise (BEC) and Ransomware incidents, helping insured organizations investigate, contain, and recover from cyber related incidents. Building on our success in incident response, we are launching a Managed Detection and Response (MDR) service designed to protect our DFIR clients from future incidents. The MDR program will deliver proactive monitoring, detection, and prevention solutions - powered by tools like Sophos EDR/NDR, Microsoft 365, and Google Workspace. Job Summary Join us as a Software Engineer, DFIR and take a role in shaping our digital forensics and incident response practice for TMHCC-CPLG insureds. In this position, you'll combine technical expertise to drive complex engineering initiatives that enhance the scale, speed, and precision of our investigations. You'll join a team of talented engineers through hands-on problem-solving, build scalable solutions for evolving threats, and help refine our consulting capabilities.
Key Responsibilities Intro Relying on experience and knowledge, this role is responsible for accomplishing the following assignments. These assignments are varied in nature: Leadership and Mentorship:
- Assign tasks, delegate responsibilities, and provide mentorship to team members.
- Support development and maintenance of operating procedures and best practices for engineering team.
- Maintain positive, professional insured/carrier relationships.
- Foster a culture of innovation, continuous learning, and skill development within the engineering team.
Client Management and Engagement:
- Understand insured needs and tailor strategies to address specific business risks and compliance requirements.
- Communicate complex engineering concepts internally and externally.
Incident Engineering Operations:
- Develop and maintain engineering automation in support of incident response plans aligned with industry best practices.
Technical Experience:
- Stay informed about emerging engineering technologies and industry best practices.
- Understand and be aware of digital forensics methodologies for evidence collection, analysis, and reporting.
- Provide expert technical guidance on engineering methodologies, automation techniques, software development and recovery techniques.
- Occasionally, support complex digital forensic investigations, including analysis of system logs, network traffic, and endpoint data.
Competencies Planning
Follow work plans, established timelines, and predefined goals for assigned work.
Meet commitments on deadlines.
Communication
Communicate activities, results, and observations with employees and management as appropriate.
Cost Management
Identify areas for improvement in existing business practices.
Perform work thoroughly in a cost-efficient manner and at a high productivity level.
Business Controls and Policies
Comply with all corporate policies and procedures.
Report any breakdowns in controls to management.
Conduct all activities in a safe manner.
People Management
No people management responsibility
Minimum 4 year / bachelor's degree in cyber security, Computer Science, Information Technology related degree or relevant professional work experience
Certification, Licenses, and Designations 2 years in leading active cybersecurity engagements, developing security automation and/or SOAR capabilities in support of security incident response, digital forensics, malware analysis or threat intelligence
Advanced degrees or certifications in security (CISSP, CISM, GCFE, GCFA, GREM, GBFA, GCIH, CFCE, CCE) or cloud engineering (AWS Certified Security, Azure Security Engineer, Google Professional Cloud Security Engineer, CCNA, MCSE are a plus.
Other - Experience with CI/CD platforms and maintenance, such as Github Actions, ArgoCD, and FluxCD.
- Experience with relational database administration, SQLAlchemy, SQLModel, and full stack application development.
- Experience developing and running containerized services within AWS.
- Programming experience in Bash, Python, PowerShell, or Go.
- Experience with Rust, especially in developing command line tools or building rust bindings for python.
- Experience with large-scale data ingest and data processing pipelines and related tooling: AWS Kinesis, Kafka, Apache Airflow, Vector, Cribl.
- Experience with big data or machine learning categorization algorithms and Python libraries.
- Experience with Vue, JavaScript, TypeScript, or AG Grid is a plus.
- Experience with Kubernetes, EKS, KEDA, Karpenter, secure secret management within a Kubernetes cluster, istio, AWS IRSA.
- Experience with infrastructure as code projects such as: OpenTofu, Terraform, Crossplane, AWS Controller for Kubernetes (ACK).
- Understanding of cloud platforms and security considerations within AWS (Amazon Web Services), Azure, Microsoft 365, and Google Cloud Platform (Google Cloud Platform).
- Experience with EDR solutions (Defender, SentinelOne, CrowdStrike)
- Strong understanding of legal and regulatory frameworks related to cyber security investigations such as PCI, NIST CSF, or other industry-specific regulations.
- Excellent communication and presentation skills to clearly and concisely communicate complex technical concepts to stakeholders.
- Superior organizational and analytical skills; demonstrated ability to manage multiple tasks simultaneously.
Additional Working Conditions and Physical Conditions - Overtime hours may be required to fulfill job responsibilities
- May be required to remain stationary for extended periods of time
- May be required to move up to 10 pounds
- Must be able to operate a computer and other devices
- Close vision and ability to adjust focus, such as required to read a computer screen
- Regular travel (up to 50% of time)