Detection & Response Engineer
San Francisco & Palo Alto, CA
Full Time Mid-level / Intermediate USD 200K - 340K
About xAI
xAI’s mission is to create AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge.
Our team is small, highly motivated, and focused on engineering excellence. This organization is for individuals who appreciate challenging themselves and thrive on curiosity.
We operate with a flat organizational structure. All employees are expected to be hands-on and to contribute directly to the company’s mission. Leadership is given to those who show initiative and consistently deliver excellence. Work ethic and strong prioritization skills are important.
All engineers and researchers are expected to have strong communication skills. They should be able to concisely and accurately share knowledge with their teammates.
About the Role
We are seeking a skilled and proactive Detection & Response Engineer to join our security team. In this critical role, you will be responsible for detecting, investigating, and responding to security incidents across our cloud-native and AI-focused infrastructure. You will play a key part in safeguarding our innovative technologies and sensitive data.
Ideal Experience
- Monitor and analyze security alerts and logs to identify potential threats and anomalies
- Develop, implement, and maintain detection rules and correlation logic in our SIEM platform
- Conduct thorough investigations of security incidents, performing root cause analysis and impact assessments
- Lead incident response efforts, coordinating with relevant teams to contain and mitigate threats
- Create and maintain incident response playbooks and runbooks
- Perform regular threat hunting activities to proactively identify potential security risks
- Develop and refine metrics and reporting to track the effectiveness of detection and response capabilities
- Collaborate with other security teams to improve overall security posture and incident handling processes
- Stay current with emerging threats, attack techniques, and defensive strategies in the cloud-native and AI domains
Requirements
- Bachelor's degree in Computer Science, Cybersecurity, or a related field
- 3-5 years of experience in security operations, incident response, or a similar role
- Strong understanding of cybersecurity principles, attack techniques, and defensive strategies
- Proficiency in at least one scripting language (e.g., Python, Rust) for automation and tool development
- Experience with SIEM platforms and log analysis tools
- Familiarity with cloud environments (e.g., AWS, GCP, Azure) and their security features
- Knowledge of network protocols, system administration, and common attack vectors
- Strong analytical and problem-solving skills with attention to detail
- Excellent communication skills and ability to work effectively under pressure
Preferred Qualifications
- Relevant security certifications (e.g., GCIH, GCIA, SANS)
- Experience with threat intelligence platforms and their integration into detection processes
- Familiarity with AI/ML security implications, particularly those outlined in the OWASP LLM Top 10
- Knowledge of software supply chain security and SBOM analysis
- Experience with containerized environments and Kubernetes security
Bonus Skills
- Experience in building custom security tools or integrations to enhance detection and response capabilities
- Interest in leveraging AI to improve threat detection and automate response processes
- Contributions to open-source security projects or threat research
- Experience with digital forensics and malware analysis
Annual Salary Range
$200,000 - $340,000 USD
xAI is an equal opportunity employer and does not unlawfully discriminate based on race, color, religion, ethnicity, ancestry, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, age, disability, medical conditions, genetic information, marital status, military or veteran status, or any other applicable legally protected characteristics.
Qualified applicants with arrest or conviction records will be considered for employment in accordance with all applicable federal, state, and local laws, including the San Francisco Fair Chance Ordinance, Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act.
For Los Angeles County (unincorporated) Candidates:
xAI reasonably believes that criminal history may have a direct, adverse and negative relationship on the following job duties, potentially resulting in the withdrawal of a conditional offer of employment:
- Access to information technology systems and confidential information, including proprietary and trade secret information, and/or user data;
- Interacting with internal and/or external clients and colleagues; and
- Exercising sound judgment.
Tags: Automation AWS Azure CCPA Cloud Computer Science Forensics GCIA GCIH GCP Incident response Kubernetes LLMs Log analysis Malware OWASP Privacy Python Rust SANS SBOM Scripting SIEM Threat detection Threat intelligence Threat Research
Perks/benefits: Salary bonus Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.