Imagine yourself as a SOC analyst and a new alert shoots to the top of the queue. You open the alert and all of the relevant facts are laid out for you. You know the whos the whats and the wheres of what happened and it’s all right there in the alert. You notice the attacker IP immediately you wonder “Where is that IP located?”. Wonder no more because the IP has already been fully enriched with all publicly available information! This looks bad, just as you’re about to shift to the EDR console to see what kind of damage was done, you notice further down that’s already been provided for you. You have full context of everything that happened before, during and after this event and it’s confirming your suspicions. You raise the alarm and notify the customer that you’re digging into a potential security incident and it only took 20 seconds to make that decision.
Want more jobs like this?
Get jobs that are Remote delivered to your inbox every week.
Now imagine you are the one who created that alert. You understand security operations and have a keen understanding of what information is needed to make an informed decision about a potential attack. You know the sort of enrichment needed to provide the right context about the facts of the alert. You have studied the metrics from previous investigations and know where analysts get tripped up or slowed down on decisions during the moments that matter. You streamline the response process through automation and make sure the decisions can be made quickly. Now imagine that the SOC analyst never even needed to triage the alert because of your automations, it was automatically promoted to an incident for the SOC.
You also enjoy working together on a team to prioritize the problems that matter and work toward a solution. And you have a high degree of empathy and understand the demands of working in a SOC environment. You understand that scaling operations doesn’t always mean scaling with more people, the real strength comes when you can arm analysts with the tools they need to become super heroes.
Does this sound like you? At Expel, we’re taking a new approach to managed security. We spend our time trying to discover ways to keep our customers safe and our security analysts happy. We’re trying to meet our customers where they are—understanding a vast number of attacker tactics, security vendor capabilities, and customer requirements. We believe innovating while handling the combinatorial explosion represents a captivating problem. If you agree, we may have the job for you!
What Expel can do for you
- Place you into the middle of a fast-growing cybersecurity company with the most enthusiastic customers you’ve ever seen—a welcome surprise in the MSSP/MDR market
- Give you an opportunity to collaboratively drive a significant security capability of the business
- Enable you to learn from analysts, data scientists, engineers, and responders responsible for various components of Expel’s service and technology
- Facilitate ways to harness event signal from cloud service providers
- Provide an entertaining small and highly transparent startup environment
- Challenge you to push the boundaries of our security vision
- Provide access to popular EDR, network, and SIEM technologies
What you can do for Expel
- Implement, maintain and iteratively improve Expel's ability to detect and investigate threats using integrated technologies with limited direction
- Contribute to the growth of Expel’s detection strategy and capability through creation of detections for Expel’s proprietary rule engine.
- Maintain documentation in support of Expel’s detection and response content
- Improve SOC analyst efficiency by automating investigative workflows using an orchestration framework written in Python.
- Evaluate technology APIs to design detection and response solutions to contribute to improving the value and efficiency in Expel’s Workbench platform.
- Contribute to and thrive in a culture of experimentation, agile, quality and continuous improvement among the team.
- Participate in the team’s research and monitoring of the latest threat landscape and subsequent detection and response automation development.
What you should bring with you
- 1+ years of experience with detection and response tools, particularly EDR, NSM, and SIEM.
- 1+ years of experience writing, deploying and tuning custom detections based on research or investigative work against common data sets (Windows Event Logs, auditd, CloudTrail, and similar datasets.)
- Proficiency of Python, Go or other object oriented programming languages
- Strong understanding of Windows, macOS and Linux operating systems and command line tools.
- Knowledge of networking basics, such as TCP/IP and OSI model.
- Working knowledge and observations of attack vectors, threat tactics, and attacker techniques.
- Understanding of cloud infrastructure platforms and their Identity and Access Management (IAM) models.
- Bachelor’s degree in Computer Science or Information Security strongly preferred.
- 3+ years of professional experience in information technology or security operations would be ideal but not required.
Additional Information
The base salary range for this role is a base salary between €69,400 EUR and €100,600 EUR + bonus eligibility and equity.
At Expel, our employee benefits reflect our commitment to our crew. We provide 25 days annual leave in addition to public holidays, parental leave, and excellent health benefits are some of the ways we care for our Expletives.
While our HQ is in the U.S., we are a global company! Most of our team is remote, and we have full support for remote interaction. We realize that there is also a benefit to in-person interaction so we occasionally meet up in Dublin and there could be some travel to our HQ in Herndon, VA.
We're an Equal Opportunity Employer: You'll receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.
We're only hiring those authorized to work in Ireland.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
#LI-remote