LinkedIn is looking for an experienced Staff Incident Response Engineer to be an integral part of our Information Security organization. The Incident Response team is responsible for protecting our infrastructure, applications, and, most importantly, our members. This role will be responsible for playing a key role in our security monitoring and incident response team. The role is a Staff position, coming in with years of real world experience in responding and leading incident investigations, developing playbooks, and continually striving to improve processes and response times. Additionally as a staff, a successful candidate will help lead the continued improvements, mentor more junior team members, while acting as a lead during large scale incidents.
Responsibilities: · Independently triage security alerts and incident reports. · Investigate incidents using available resources, forensic and threat hunting skills. · Drive medium to large scale incidents with multiple team members and partner teams to closure and full remediation. · Conduct host, network, and log analysis in support of incident response investigations · Enhance our in-house incident response platforms and build new capabilities. · Participate in daytime on-call activities. · Work with partner teams including: PR, HR, Legal, Compliance, Investigations, Microsoft CDOC, Engineering, EPE. · Contribute to improving processes, procedures and technologies used by the team. · Automate or engineer new solutions to support efficient incident response capabilities. · Provide feedback to detection engineering team about accuracy and quality of detections · Provide proactive and accurate data to all stakeholders for internal communication · Help uplift entire team by providing demonstration of new processes or training on systems · Support mentoring and technical development of incident response engineers
Basic Qualifications: · BA/BS degree in Computer Science, Information Security, Cybersecurity, or other related technical and engineering disciplines, or equivalent practical experience · 5+ years experience in Information Security, with 4+ years experience in Incident Response or adjacent areas like detection engineering, offensive security, security research, etc. as part of that experience. · Incident response experience should include: · Experience with triaging security alerts · Experience with incident lifecycle and incident handling · Experience with log analysis · Experience with SIEM solutions · Experience with Windows, OSX and Unix operating systems logs · Experience with Web Server logs. · Experience with EDR solutions · Experience with system level analysis - Windows, Linux, and Mac. · Experience with 2 or more of these areas: · System Forensics · Network Forensics · Cloud Forensics · SOAR/Security Orchestration · Threat Intelligence
Preferred Qualifications: · Master's degree in Information Security, CyberSecurity, Computer Science, or other related technical disciplines. · Technical certifications (SANS, OSCP, etc.) · Development experience, the ability to understand source code and develop scripts. · Cloud fundamentals and experience · Practical threat hunting experience with open source tool chain · Scripting knowledge to automate repetitive, time consuming and error prone activities using a general purpose scripting language (ex: Python) · Prior experience with malware analysis