Security Engineer (Threat Management Response) (Remote)
At Cisco Meraki, you will have the opportunity to be a part of a tight-knit engineering organization working with hardworking, effective engineers, particularly within our site reliability and security teams. You will have significant influence over the tools that we used to supervise and audit our system and where we choose to deploy them. Finally, by developing our capabilities to promptly detect and respond to threats, you will have a direct, immediate, and positive impact on our customers and the hundreds of millions of users that use and rely on Meraki access points, switches, security appliances, and cameras every single day!
The modern world runs on the internet, and the internet cannot exist without its underlying infrastructure. Meraki makes setting up, managing, and maintaining that infrastructure easier than it has ever been before. Meraki enables connectivity everywhere from neighborhood cafes to education institutions to global hospitality groups operating thousands of sites.
The Threat Management Response team is responsible for 24x7x365 monitoring and rapid incident response for all Cisco Meraki environments. We are the last line of defense to protect the company and our customer's data from our threat actors and adversaries.
- Ability to write custom query logic for major Security Incident and Event Monitoring (SIEM) tools
- Experience responding to high severity incidents and handling the remediation process. (e.g. Malware analysis, large scale phishing attacks, production intrusion, etc.)
- Familiarity with the following tools:
- File Integrity Monitoring (FIM)
- Vulnerability Scanners
- Network and Host Intrusion Detection (IDS) such as SNORT/Sourcefire, Palo Alto, etc.
- Endpoint Detection & Response (EDR)
- Security Orchestration, Automation & Response (SOAR)
- Investigate security events for the following platforms and technologies:
- Cloud (AWS, Azure, GCP)
- Work with Threat Detection team engineers to proactively add monitoring and alerting to new features and services
You are an ideal candidate if you:
- Have experience working on incident response teams
- Have experience leading threat hunts, using available logs and threat intelligence to proactively identify and investigate potential risks and suspicious behavior
- Have a minimum of 4-6+ years in cybersecurity, passionate about Incident Response
- Understand OWASP Top 10 application security vulnerabilities, and have experience with bug bounty programs
- Have familiarity with MITRE ATT&CK and/or D3FEND frameworks
- Have familiarity with access control technologies such as Active Directory, Okta, Duo, and LDAP
Bonus points for:
- Relevant industry security certifications such as CISSP, SANS GIAC (e.g. GCIH, GNFA, GCFE, GCFA, GREM), AWS certifications (SAA, SAP, or SCS), etc.
- Familiarity with other security verticals such as: Digital Forensics, Threat Intelligence, Threat Detection, Application Security, Cloud Security, Offensive Security
Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records.
At Cisco Meraki, we’re challenging the status quo with the power of diversity, inclusion, and collaboration. When we connect different perspectives, we can imagine new possibilities, encourage innovation, and release the full potential of our people. We’re building an employee experience that includes appreciation, belonging, growth, and purpose for everyone!
Message to applicants applying to work in the U.S. and/or Canada:
When available, the salary range posted for this position reflects the projected hiring range for new hire, full-time salaries in U.S. and/or Canada locations, not including equity or benefits. For non-sales roles the hiring ranges reflect base salary only; employees are also eligible to receive annual bonuses. Hiring ranges for sales positions include base and incentive compensation target. Individual pay is determined by the candidate's hiring location and additional factors, including but not limited to skillset, experience, and relevant education, certifications, or training. Applicants may not be eligible for the full salary range based on their U.S. or Canada hiring location. The recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees have access to quality medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, short and long-term disability coverage, basic life insurance and numerous wellbeing offerings. Employees receive up to twelve paid holidays per calendar year, which includes one floating holiday, plus a day off for their birthday. Employees accrue up to 20 days of Paid Time Off (PTO) each year and have access to paid time away to deal with critical or emergency issues without tapping into their PTO. We offer additional paid time to volunteer and give back to the community. Employees are also able to purchase company stock through our Employee Stock Purchase Program.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components. For quota-based incentive pay, Cisco pays at the standard rate of 1% of incentive target for each 1% revenue attainment against the quota up to 100%. Once performance exceeds 100% quota attainment, incentive rates may increase up to five times the standard rate with no cap on incentive compensation. For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.