wagey.ggwagey.ggv1.0-e93b95d-4-May
Browse Tech JobsCompaniesFeaturesPricingFAQs
Log InGet Started Free
Jobs/Security Engineer Role/truezerotech - True Zero Technologies - Security Monitoring Detection Engineer (R-00143)
truezerotech

truezerotech - True Zero Technologies - Security Monitoring Detection Engineer (R-00143)

Remote - Americas2w ago
RemoteNASecurity EngineerSQLPythonSplunkData Analysis

Upload My Resume

Drop here or click to browse · Tap to choose · PDF, DOCX, DOC, RTF, TXT

Apply in One Click
Apply in One Click

Requirements

• Technical Expertise: Strong proficiency in Python scripting, SQL, and regex, as well as experience with SIEM platforms (e.g., Splunk, Microsoft Sentinel). • Behavioral Analysis: Understanding of attacker techniques, tactics, and procedures (TTPs). • Data Analysis: Ability to parse and analyze large-scale log data for anomalies. • Background: Often requires experience in SOC analysis, incident response, or threat hunting. • We’re actively searching for talented and expereinced professionals who are ready to experience the True Zero difference. As a True Zero team member, you'll enjoy: • Competitive salary, paid twice per month • Best in class medical coverage • 100% of medical premiums covered by True Zero • Company wide new business incentive programs • Contribution Incentives (i.e. white papers, blog posts, internal webinars, etc.) • 3 weeks of PTO starting + 11 Paid Holidays Annually • 401k Program with 100% company match on the first 4% • Monthly reimbursement of Cell Phone and Home Internet costs • Paternity/Maternity Leave

Responsibilities

• "Detection as Code" (DaC): Applying software engineering principles (version control, CI/CD, testing) to security rules. • Threat Mapping: Mapping detection strategies against frameworks such as MITRE ATT&CK to identify coverage gaps. • Log Analysis: Analyzing telemetry from endpoint, network, cloud, and identity systems to identify anomalous patterns. • Tuning and Optimization: Continuously tuning rules to reduce noise and enhance actionable alerts. • Detection Lifecycle Management: Designing, developing, testing, deploying, and maintaining rules to detect threats.

Get Started Free

No credit card. Takes 10 seconds.

Privacy·Terms··Contact·FAQ·Wagey on X