Jobs

108
companies
1,942
Jobs

Sr. Security Automation Engineer, Threat Detection & Response

HashiCorp

HashiCorp

Software Engineering
United States
Posted on Wednesday, January 3, 2024

Sr. Security Incident Response Engineer

About Us:

HashiCorp is a fast-growing organization that solves development, operations, and security challenges in infrastructure so organizations can focus on business-critical tasks. We build tools to ease these decisions by presenting solutions that span the gaps. Our tools manage both physical machines and virtual machines, Windows, and Linux, SaaS and IaaS, etc. Our open source software is used by millions of users to provision, secure, connect, and run any infrastructure for any application. The Global 2000 uses our enterprise software to accelerate application delivery and drive innovation through software.

About this team:

We're looking for talented Incident Responders to join our Threat Detection and Response Team (TDR). This team will help defend HashiCorp through strategic detection, response, and prevention patterns across all of our products and the enterprise. This person will be responsible for incident response from start to finish coordinating across multiple teams of varying technical ability.

In this role, you will:

As a member of our TDR team, you’ll be responsible for ensuring we are continually striving for best practices implemented within incident response that enables HashiCorp to quickly respond to emerging threats.

You will partner with engineering and other stakeholders to define and drive a rapid response program to secure our vast technological footprint supporting our products and the enterprise. Tooling and automation will be key to success as we scale our environments to meet customer demand. Lastly, we can’t detect what we cant see, so driving visibility improvements across the company will be key to ensuring the IR function is always equipped with the necessary data to perform their job function.

Engineering at HashiCorp is largely a remote team. While prior experience working remotely isn't required, we are looking for team members who perform well given a high level of independence and autonomy.

HashiCorp embraces diversity and equal opportunity. We are committed to building a team that represents a variety of backgrounds, perspectives, and skills. We believe the more inclusive we are, the better our company will be.

Qualifications:

  • 2+ years in an IR, Detection, or Threat Intel Role
  • Understand how to properly determine scope and impact from an array of multiple alerting systems monitoring both corporate IT and production environments
  • Comfortable with the incident response process, from triage to closure, providing various levels of support and coordination across multiple teams
  • Desire to solve response challenges with automation and strive for efficient use of human operator time
  • Working Knowledge of:
  • Linux (Production Workloads), Mac (Primary endpoints in our fleet), Windows (Plus but not required)
  • Cloud Provider Environments
  • CI / CD experience
  • Common Infrastructure as Code deployment processes.
  • Intermediate knowledge of either Python, or Go, with a desire to continue to build these skills and contribute to internal tool development.

Desired:

  • Cloud Workload Forensics - Memory and Storage collection and analysis
  • Understanding of legal holds, chain of custody and other fun IR activities to protect HashiCorp
  • Speaking / publishing at security conferences
  • Publicly released tools or modules

#LI-AZ1

#LI-REMOTE

Canada, Colorado, California, Washington and New York Applicants: To view base salary ranges for this role in your location and to learn more about which roles are eligible for bonus pay or commissions, please visit our Pay Transparency Calculator below. Individual pay within the range will be determined based on job related-factors such as skills, experience, and education or training. Information on our benefits can be found via the link below. Intern ranges can be found below.