Staff SOC Engineer (DFIR & Hunt) @ DigitalOcean | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
Staff SOC Engineer (DFIR & Hunt) jobs in San Francisco, CA
200+ applicants
company-logo

DigitalOcean · 3 days ago

Staff SOC Engineer (DFIR & Hunt)

ftfMaximize your interview chances
Cloud ComputingDevOps
check
Growth Opportunities
check
H1B Sponsor Likelynote
Hiring Manager
Kiley Rumpf
linkedin

Insider Connection @DigitalOcean

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Establish an understanding of DigitalOcean’s entire production environment, from applications to infrastructure, keeping up-to-date with material changes and future directions.
Lead live intrusions and incident response investigations with on-call responsibilities, in a customer-oriented and transparent manner, to minimize the impact of malicious actors.
Collect digital artifacts from cloud, on-premise, and employee systems for analysis to reconstruct what may have occurred on a system leveraging digital forensics methodologies.
Use advanced network traffic analysis techniques to identify compromised systems, negate denial of service attacks, and pinpoint resource anomalies.
Identify trends in malicious activity, inform leadership, and perform preventative measures.
Act as a point of contact for security and related incidents: providing supporting data for critical issues, downtime events, root causes, and post-mortem reports.
Build tools to identify and automate response to malicious activity with enhancements to refine incident response procedural documentation as needed.
Build strong relationships with technical teams across all business functions to harden account, platform, and service structures to combat intrusions, compromises, and disruptions.
Effectively communicate and collaborate with staff including legal counsel, trust & governance, and executive leadership.
Engage in R&D efforts to identify and develop the latest forensic tools, techniques, and procedures.
Implement technical recommendations that mature incident response and digital forensics capabilities.
Provide comprehensive feedback and technical advice to juniors and peers to increase team maturity and speed of advancement.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Digital ForensicsIncident ResponseNetwork Traffic AnalysisVulnerability AnalysisMalware AnalysisData AnalysisCoding SkillsTechnical Writing

Required

10+ years minimum, of job related experience leading live incident response activities transparently, in a fast-paced team environment where accuracy of analysis determines business impact.
Ability to differentiate between normal and unusual resource usage patterns in customer and employee network/system behaviors in order to hunt for subtle anomalous patterns.
Hands-on experience with both dead-disk and live digital forensics, especially on Linux or Unix systems using open source tools (eg, volatility, sleuthkit) in an enterprise production environment at cloud scale.
Data analysis skills, including familiarity with relational databases, structured query languages, logging infrastructures, and data visualization tools.
Familiarity with basic static and dynamic malware analysis for triage, identification, prioritization, and remediation of new malware families and behaviors (e.g: x86 assembly, binary analysis).
A high degree of curiosity and aptitude, with a clear passion for security and the desire to keep our employees, customers, and the internet safe.
Clear written and verbal communication skills to include; technical writing, presenting, coaching, mentoring.
A proven track record of improving enterprise and operational security as the business scales, driving continuous improvement through data collection, correlation, and control enhancements.
Five or more years of experience maturing hands-on forensics and incident response protocols.
Ability to conduct vulnerability analysis, scoping, and mitigation planning for the internal employee environment.
Ability to perform comprehensive threat intelligence analysis based on proactive hunts with clear and concise dissemination of findings.
Ability to perform network protocol analysis and design of internal applications to recommend design changes as needed.
Proven coding skills to develop automations and custom tools reducing time and complexity.

Benefits

Reimbursement for relevant conferences, training, and education
Access to LinkedIn Learning's 10,000+ courses
One-time work from home stipend
Wellness allowance
Flexible time off policy
Bonus in addition to base salary
Equity compensation including equity grants upon hire and the option to participate in our Employee Stock Purchase Program

Company

DigitalOcean

company-logo
DigitalOcean provides a cloud platform to deploy, manage, and scale applications of any size.

H1B Sponsorship

DigitalOcean has a track record of offering H1B sponsorships. Please note that this does not guarantee sponsorship for this specific role. Below presents additional info for your reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2023 (3)
2022 (19)
2021 (19)
2020 (10)

Funding

Current Stage
Public Company
Total Funding
$491.28M
Key Investors
Global Secure InvestAccess IndustriesKeyBanc Capital Markets
2021-09-13Post Ipo Equity· $34.91M
2021-03-23IPO· undefined
2021-01-01Series Unknown· undefined

Leadership Team

leader-logo
Admas Kanyagia
VP, Social Impact
linkedin
leader-logo
Adrienne Calderone
Vice President, Finance
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot