The AI Job Search Engine
Sr. Staff Security Engineer(m/w/x)
Leading complex security investigations and driving organizational direction for a data and AI platform with 10,000+ clients. Deep expertise in Incident Management and Incident Response tool development required. Direct influence on platform security roadmap and technology adoption.
Requirements
- 12+ years of experience in security with strong focus on incident response, detection, and/or threat intelligence, or advanced degree with 8+ years of experience
- Deep expertise in Incident Management and Incident Response tool development
- Knowledge of Azure and AWS cloud concepts
- Expertise in analyzing logs and correlating log sources for attack scenarios
- Ability to identify logging gaps and suggest IR configurations
- Ability to function as cloud deployment architect
- Ability to map cloud environment fundamentals to other major providers
- High skill in multiple digital forensics areas (Network, Application/Log Analysis, Host/Disk, Memory Forensics/Malware Analysis, Cloud Forensics, Endpoint Forensics)
- Confidence in speaking on advanced concepts (virtualized networking, network anomalies, container forensics)
- Detailed understanding of enterprise security incidents
- In-depth knowledge of malware on endpoints
- Expert understanding of MacOS security posture and architecture
- Proficiency with SIEM, SOAR platforms, EDR solutions, and forensic analysis tools
- Skill in leveraging AI and automation for security operations and threat detection
- Exceptional ability in difficult conversations
- Empathy and emotional intelligence
- Proven capability to build, mentor, and lead cybersecurity teams
- Fostering culture of excellence and continuous improvement
- Strong communication of technical decisions
- History of proactive issue identification and solving
- Strong desire to help peers and collaborate effectively
- Ability to push back on unreasonable stakeholder requests professionally
Tasks
- Drive organizational direction and roadmap
- Lead internal conversations on technology
- Inspire technology adoption
- Make decisions with long-term impact
- Lead complex investigations
- Conduct impact analysis
- Perform crisis management using IMS
- Engage with various stakeholders
- Communicate findings to executive leadership
- Ensure successful incident navigation with minimal impact
- Demonstrate expert knowledge of cloud vendors (AWS, Azure, GCP)
- Understand major business component architecture
- Articulate security and risk limits
- Establish a cutting-edge threat detection and response program
- Reduce Mean Time to Detect (MTTD)
- Reduce Mean Time to Respond (MTTR)
- Architect scalable security automation and orchestration frameworks
- Conduct pre-investigation analysis of alerts
- Triage security alerts
- Understand security industry trends and directions
- Architect large-scale designs consistent with goals
- Solve difficult, company-impactful problems
- Understand malicious activity across cloud layers
- Analyze existing logs for malicious activity
- Correlate data from multiple sources during investigations
- Act as a role model for the team
- Mentor technical team members
- Identify external sharing opportunities
- Guide content creation for external communication
- Communicate via presentations and blogs
- Collaborate with cross-functional departments
- Integrate security practices across the organization
- Integrate security into product development lifecycle
Work Experience
Languages
Tools & Technologies
- NebiusFull-timeWith HomeofficeSeniorBerlin
- Keyrock
SOC Analyst (Level 2)(m/w/x)
Full-timeRemoteExperiencedBerlin - Planet
Corporate Security Engineer(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin - N26
Senior SOC Engineer(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - Enpal B.V.
Staff Software Security Engineer(m/w/x)
Full-timeWith HomeofficeSeniorBerlin
Sr. Staff Security Engineer(m/w/x)
Leading complex security investigations and driving organizational direction for a data and AI platform with 10,000+ clients. Deep expertise in Incident Management and Incident Response tool development required. Direct influence on platform security roadmap and technology adoption.
Requirements
- 12+ years of experience in security with strong focus on incident response, detection, and/or threat intelligence, or advanced degree with 8+ years of experience
- Deep expertise in Incident Management and Incident Response tool development
- Knowledge of Azure and AWS cloud concepts
- Expertise in analyzing logs and correlating log sources for attack scenarios
- Ability to identify logging gaps and suggest IR configurations
- Ability to function as cloud deployment architect
- Ability to map cloud environment fundamentals to other major providers
- High skill in multiple digital forensics areas (Network, Application/Log Analysis, Host/Disk, Memory Forensics/Malware Analysis, Cloud Forensics, Endpoint Forensics)
- Confidence in speaking on advanced concepts (virtualized networking, network anomalies, container forensics)
- Detailed understanding of enterprise security incidents
- In-depth knowledge of malware on endpoints
- Expert understanding of MacOS security posture and architecture
- Proficiency with SIEM, SOAR platforms, EDR solutions, and forensic analysis tools
- Skill in leveraging AI and automation for security operations and threat detection
- Exceptional ability in difficult conversations
- Empathy and emotional intelligence
- Proven capability to build, mentor, and lead cybersecurity teams
- Fostering culture of excellence and continuous improvement
- Strong communication of technical decisions
- History of proactive issue identification and solving
- Strong desire to help peers and collaborate effectively
- Ability to push back on unreasonable stakeholder requests professionally
Tasks
- Drive organizational direction and roadmap
- Lead internal conversations on technology
- Inspire technology adoption
- Make decisions with long-term impact
- Lead complex investigations
- Conduct impact analysis
- Perform crisis management using IMS
- Engage with various stakeholders
- Communicate findings to executive leadership
- Ensure successful incident navigation with minimal impact
- Demonstrate expert knowledge of cloud vendors (AWS, Azure, GCP)
- Understand major business component architecture
- Articulate security and risk limits
- Establish a cutting-edge threat detection and response program
- Reduce Mean Time to Detect (MTTD)
- Reduce Mean Time to Respond (MTTR)
- Architect scalable security automation and orchestration frameworks
- Conduct pre-investigation analysis of alerts
- Triage security alerts
- Understand security industry trends and directions
- Architect large-scale designs consistent with goals
- Solve difficult, company-impactful problems
- Understand malicious activity across cloud layers
- Analyze existing logs for malicious activity
- Correlate data from multiple sources during investigations
- Act as a role model for the team
- Mentor technical team members
- Identify external sharing opportunities
- Guide content creation for external communication
- Communicate via presentations and blogs
- Collaborate with cross-functional departments
- Integrate security practices across the organization
- Integrate security into product development lifecycle
Work Experience
Languages
Tools & Technologies
About the Company
Databricks
Industry
IT
Description
Databricks is the data and AI company that unifies and democratizes data, analytics, and AI for over 10,000 organizations worldwide.
- Nebius
Senior Security Solutions Engineer(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - Keyrock
SOC Analyst (Level 2)(m/w/x)
Full-timeRemoteExperiencedBerlin - Planet
Corporate Security Engineer(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin - N26
Senior SOC Engineer(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - Enpal B.V.
Staff Software Security Engineer(m/w/x)
Full-timeWith HomeofficeSeniorBerlin