Cyber Incident Response Security Engineer at Proofpoint, responsible for incident response and security automation. Collaborating globally to defend against cyber threats and enhance incident response capabilities.
Responsibilities
Act as the Level 3 escalation point for high-severity security incidents within the global 24/7 SOC.
Lead complex investigations into advanced cyber threats, including malware outbreaks, targeted attacks, and persistent threats.
Provide expert-level guidance on containment, mitigation, and remediation strategies.
Proactively hunt for hidden threats within enterprise networks using threat intelligence and behavioral analytics.
Develop and refine threat detection rules to improve SOC visibility.
Assess emerging threats and provide actionable recommendations to enhance security posture.
Design and implement automated workflows to enhance security event triage and response.
Leverage SOAR (Security Orchestration, Automation, and Response) platforms to streamline incident response.
Work with SIEM (Security Information and Event Management) tools to optimize log ingestion and alerting mechanisms.
Collaborate with security architects and engineers to enhance detection and response capabilities.
Perform root cause analysis on security incidents and recommend improvements to security controls.
Stay updated on industry best practices and evolving attack techniques to ensure effective defenses.
Requirements
12 yrs + hands-on experience in Cybersecurity Incident Response or Security Operations.
Must be a US Citizen.
Strong background in SOC operations, SIEM, threat intelligence, and digital forensics.
Expertise in investigating malware, phishing, web attacks, insider threats, and advanced persistent threats (APTs).
Experience working with security automation and orchestration tools (SOAR).
Familiarity with scripting languages such as Python, PowerShell, or Bash for security automation.
Strong understanding of MITRE ATT&CK framework, TTPs (Tactics, Techniques, and Procedures), and cyber kill chain.
Hands-on experience with cloud security (AWS, Azure, GCP) is a plus.
Certifications such as GCIH, GCFA, CISSP, CISM, or OSCP are highly desirable.
Ability to work in a fast-paced, global environment and collaborate with cross-functional teams.
Information Systems Security Officer managing operational security posture for information systems at GDIT. Collaborating closely with ISSM and ISO, handling security aspects, and ensuring compliance with security standards.
Program Security Representative providing multi - discipline security support for Special Access Programs. Ensuring compliance, developing policies, and conducting security assessments in a military context.
Senior Cyber Security Project Manager at Airbus Protect managing medium complexity projects in Cyber Security Consulting. Focusing on project leadership and team management in diverse client settings.
Security Architect responsible for designing cloud security architectures for leading brands. Ensuring compliance and guiding incident response strategies in AWS environments.
Senior Security Consultant for ISMS Management at Bundesdruckerei GmbH in Berlin. Responsible for security analysis, management, and advisory roles on cybersecurity issues.
IT - Systemadministrator managing Video Surveillance and Alarm Systems at Mühlbauer. Supporting technical solutions for multimedia and conference systems with project involvement and ticket handling.
AI Application Security Architect in charge of driving secure development lifecycle for AI systems across multi - cloud environments and hybrid platforms.
Security Project Manager responsible for managing cyber - security project delivery and ensuring quality execution in Bulgaria. Requires excellent communication skills and fluency in English.
Information Security professional managing governance, audit, and compliance in banking domain. Collaborating across teams to enhance security posture and control effectiveness.
IT Security Manager providing operational leadership for ICBC’s IT security program. Enhancing cyber security practices and managing security initiatives in a dynamic, hybrid cloud environment.