materialsecurity - Senior Threat Research Engineer
Upload My Resume
Drop here or click to browse · Tap to choose · PDF, DOCX, DOC, RTF, TXT
Requirements
• Technical Ability: Solid data analysis skills including writing SQL queries, experience writing detections, responding to security incidents, and the ability to parse through large datasets. • Security Domain Expertise: A successful candidate should be intimately familiar with modern adversary behavior and techniques and understand how to leverage data sources to identify them. • Collaboration & Communication: We take pride in being a transparent security team that works hard to find ways to say "yes" and enables Material to grow quickly and securely. As a Security Engineer, you'll be working closely with software engineers, data scientists, and product managers. This requires a collaborative spirit and great communication skills. • Ownership: We love security engineers who deeply care about the impact of their work and find satisfaction in a job well done. The Security Team at Material is passionate about building things in a first-class manner and avoiding shortcuts that accrue technical debt and increase toil across the team. We expect candidates to understand how to build and implement tooling to be robust and resilient. • Breadth & Growth: Being a great security engineer means continually learning new and more advanced techniques in your field, but also gaining a breadth of skills to bridge the gaps in getting things done. Whether it is improving your software development abilities, becoming an expert in a specific security subdomain, product management, or customer care, you have the drive to learn more and more. • Material Security is a remote-first workplace with an office in San Francisco, California. • By clicking "Apply for this Job", you acknowledge that you have read the California Candidate Privacy Notice Regarding Use of Personal Information https://material.security/ccpa and hereby agree to its terms.
Responsibilities
• Improve the processes, tooling, and methodologies used to detect malicious or otherwise dangerous emails. • Author detection rules that allow customers to detect email-based threats where other tools have failed. • Research attacker campaigns to identify ways to fingerprint attacker activity, infrastructure, and tactics. • Identify signals and features that are useful for training message classification systems. • Ensure a high standard of privacy for our customers’ data. • Work with our Security Architects and customers to drive down risk by improving customer email security posture and leveraging their data to enable them to make better informed decisions around risk.
No credit card. Takes 10 seconds.