Expert (Staff) Cyber Risk Management Engineer

Remote • Posted 14 hours ago • Updated 14 hours ago
Full Time
Remote
$200,000 - $250,000/yr
Fitment

Dice Job Match Score™

⏳ Almost there, hang tight...

Job Details

Skills

  • Amazon Web Services
  • SIEM
  • Risk Management
  • Incident Management
  • IDS
  • Python

Summary

NO SPONSORSHIP - NO OPT

Expert (Staff) Cyber Risk Management Engineer

SALARY: $200k - $230k-$250k plus 20% bonus

LOCATION: Remote except: Alaska, ND, Nebraska, HI, OK, VT, Maine, WV, NH, WY, Puerto Rico, DC

Looking for an expert in incident response handling complex incidents out of an enterprise environment. Intelligence driven detection pipeline. Purple team, incident, on call rotation, analyze security alerts, SIEM, EDR, IDS/IPS logs.

As a member of the Cyber Risk Management team, you will be responsible for handling complex security incidents as an Incident Commander, building detections and detection frameworks, collaborating with cross functional peers, and helping to drive our overall security strategy.

Responsibilities

  • Act as the Incident Commander for critical security events as part of our on-call rotation.
  • Foster a culture of learning through blameless post-mortems to drive measurable improvements in both processes and tooling.
  • Analyze security alerts and data from various sources (SIEM, EDR, IDS/IPS, logs) to identify and investigate sophisticated threats.
  • Lead tabletop exercises and IR simulations to a variety of audiences in order to test and refine incident response plans, identify weaknesses, and enhance communication and collaboration.

Threat Hunting and Intelligence

  • Proactively identify potential threats and weaknesses across systems and networks through hypothesis driven threat hunting.
  • Identify gaps in detection coverage and proactively develop new telemetry, detections, and analytic approaches to address emerging threats across endpoint, identity, cloud, and network domains.
  • Fuse internal telemetry with open source, commercial, and internal intelligence sources to prioritize risks and improve detection strategies.
  • Track adversary TTPs and feed findings back into our hunting and detection pipelines.

Qualifications

  • 7+ years of relevant professional experience with a Bachelor s degree in Computer Science, Information Security or a related field; an equivalent combination of education and experience will also be considered.
  • 7+ years of combined hands-on IT and security architecture development and implementation work experience with a broad exposure to infrastructure/network and multi-platform environments.
  • Deep understanding of operating systems (Windows, Linux, macOS), network protocols, cloud environments (AWS, Google Cloud Platform, Azure), and common attack techniques (MITRE ATT&CK).
  • Proficiency with investigation and forensic tools such as EDR platforms (CrowdStrike, SentinelOne), log aggregators (Splunk, ELK), and packet capture tools (Wireshark, Zeek).
  • Demonstrated ability to lead high-pressure incident response scenarios across technical and non-technical teams.
  • Scripting skills in Python, PowerShell, or Bash for automation and analysis or experience with SOAR platforms is highly preferred.


Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: napil006
  • Position Id: 8962148
  • Posted 14 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Remote

Today

Easy Apply

Full-time

$200,000 - $230,000

Remote

5d ago

Easy Apply

Full-time

200000+

Remote

5d ago

Easy Apply

Full-time

Depends on Experience

Remote

Today

Full-time

USD 204,000.00 - 255,000.00 per year

Search all similar jobs