About the team: The security operation platform team is missioned to build innovative security solutions to protect our products, infrastructures, and customers from cyberattacks. We take on the challenges of fighting against ever evolving cyber threats and attacks. Our team is passionate about tackling sophisticated cyber security problems, through effective software engineering, solid computer science fundamentals, and curiosity about cyber warfare. We are a team who values trust in each other, and fosters collaboration across functional teams. We dream of ambitious goals and are determined to achieve them fast and energetically. Responsibilities: - Design, implement, and deploy security operation platforms, including not limited to SIEM, SOAR, TIP, Incidence Management, and XDR products. - Design, deploy, and operate large scale distributed systems for global threat intelligence curation, threat activity monitoring, and data analysis. - Collaborate with multiple cross-functional global teams, analyze product requirements, and deliver highly effective products rapidly. - Manage individual project priorities, deadlines and deliverables.
Minimum Qualifications: - Bachelor's degree or above in Computer Science, Computer Engineering or other relevant majors, with at least two years of software development experience in the cybersecurity domain. - Excellent algorithm, data structure, and programming skills; Proficiency in at least two general purpose programming languages. - Proficiency in back-end development, including distributed data systems and computing systems. - Proficiency in front-end development, including languages, layouts, runtimes, and frameworks. - Ability to think critically and to formulate solutions to problems in a clear, concise and timely manner. Preferred Qualifications: - Experience in building security operation platforms such as SIEM, SOAR, TIP, and incident management for threat analysts and response teams, who use the platform to manage and triage threats and alerts. - Experience in building threat intelligence systems that collect, discover, monitor, and analyze cyber threat activities. In particular, experience in developing and deploying honeypots under large scale cloud settings, and generating threat intelligence that disrupt harmful cyber activity in real time.
【For Pay Transparency】Compensation Description (Annually)
The base salary range for this position in the selected city is $118657 - $259200 annually.
Compensation may vary outside of this range depending on a number of factors, including a candidate’s qualifications, skills, competencies and experience, and location. Base pay is one part of the Total Package that is provided to compensate and recognize employees for their work, and this role may be eligible for additional discretionary bonuses/incentives, and restricted stock units.
Benefits may vary depending on the nature of employment and the country work location. Employees have day one access to medical, dental, and vision insurance, a 401(k) savings plan with company match, paid parental leave, short-term and long-term disability coverage, life insurance, wellbeing benefits, among others. Employees also receive 10 paid holidays per year, 10 paid sick days per year and 17 days of Paid Personal Time (prorated upon hire with increasing accruals by tenure).
The Company reserves the right to modify or change these benefits programs at any time, with or without notice.
For Los Angeles County (unincorporated) Candidates:
Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws including the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. Our company believes that criminal history may have a direct, adverse and negative relationship on the following job duties, potentially resulting in the withdrawal of the conditional offer of employment:
1. Interacting and occasionally having unsupervised contact with internal/external clients and/or colleagues;
2. Appropriately handling and managing confidential information including proprietary and trade secret information and access to information technology systems; and
3. Exercising sound judgment.