About the Role: As a Senior Detection and Response Engineer, you will join a 24/7 Security Operations team and play a critical role in safeguarding our organization's information assets and ensuring the integrity, confidentiality, and availability of our systems and data.
You will be responsible for designing, implementing, and maintaining advanced threat detection systems to safeguard our organization's digital assets against cyber threats.
This role requires a proactive mindset, strong analytical skills, and the ability to work collaboratively with cross-functional teams.
Key Responsibilities: Write custom detection logic while working with the Security Operations team.Assist in the day-to-day operations of the security operations center (SOC), including monitoring, analysis, and response to security incidents and alerts.Monitor and report the health of all security sensors across CoreWeave's environment and drive resolution of reported defects.Demonstrate a keen ability to multitask while still making sound decisions in high-pressure situations.Develop and implement security monitoring and detection strategies to identify and mitigate threats in real-time.Conduct threat hunting activities to proactively identify and address potential security risks and vulnerabilities.Coordinate with internal and external stakeholders to investigate security incidents, conduct root cause analysis, and develop remediation plans.Contribute to security incident response plans and procedures, ensuring timely and effective response to security incidents.Collaborate with cross-functional teams to implement security controls, policies, and procedures to protect against emerging threats and vulnerabilities.Stay on top of the latest security trends, threats, and technologies, and make recommendations for improving our security posture.Participate in security assessments, audits, and compliance initiatives to ensure adherence to regulatory requirements and industry best practices.Minimum Qualifications: Ability to deliver small to medium-sized projects that span several technical disciplines and teams.Ability to take documented detection misses and leverage available people, technology, and processes to deliver effective detections.Strong experience writing custom alert logic in any major SIEM (e.g., Splunk, Rapid7, Sumo Logic, etc.
).Intermediate understanding of Kubernetes fundamentals and the willingness and desire to grow their working knowledge of Kubernetes.Experience collaborating as a stakeholder in Purple Team & Red Team engagements.Practical knowledge of modern TTP frameworks (Cyber Kill Chain, MITRE ATT&CK).Functional knowledge of at least one query language (SQL, Splunk, HiveQL, Humio, FQL).Proficiency in at least two programming languages (e.g., Python, Bash, Go, JavaScript).Intermediate knowledge of Linux or macOS internals.Intermediate knowledge of Linux or macOS event sources (eBPF, Endpoint Security Framework).Hands-on experience applying the Incident Response Lifecycle.Our compensation reflects the cost of labor across several US geographic markets.
The base pay for this position ranges from $180,000-$210,000.
Pay is based on a number of factors including market location and may vary depending on job-related knowledge, skills, and experience.
#J-18808-Ljbffr