Security Operations Engineer II
MI - Field, United States
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
Credit Acceptance
Participating dealers offer bad credit car finance, as well as auto financing, for first time car buyers. Start your credit approval today!Credit Acceptance is proud to be an award-winning company with local and national workplace recognition in multiple categories! Our world-class culture is shaped by dedicated Team Members who share a drive to succeed as professionals and together as a company. A great product, amazing people and our stable financial history have made us one of the largest used car finance companies nationally.
Our Engineering and Analytics Team Members utilize the latest technology to develop, monitor, and maintain complex practices that help optimize our success. Our Team Members value being challenged, are encouraged to express their ideas, and have the flexibility to enjoy work life balance. We build intrinsic value by partnering with all functions of our business to support their success and make strategic business decisions. We focus on professional development and continuous improvement while enjoying a casual work environment and Great Place to Work culture!
As a Security Operations Engineer II, you'll work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting the impact. Additionally, you will apply knowledge of attacker techniques to uncover threats by analyzing log data and researching vulnerabilities to report on and build automation. Technical expertise and the ability to transform raw data into valuable information are essential for success in this role. Additionally, you will aid in supporting the vulnerability management program and senior security engineer within the SOC.Outcomes and Activities
Information Security
- This position will work from home; occasional planned travel to an assigned Southfield, Michigan office location may be required. However, this position is permitted to work at a Southfield, Michigan office location if requested by the team member.
- Collaborate with senior security team members to manage proxy exceptions, maintain security tools (e.g., SIEM, vulnerability scanners), and support API integrations.
- Assist in building SIEM dashboards and automation tools for the SOC and infrastructure teams.
- Collaborate with senior security team members asset inventories and support vulnerability management using tools like Qualys, Nessus, or Rapid7.
- Coordinate with patching teams and analysts to prioritize and remediate vulnerabilities based on threat intelligence.
- Assist in reviewing system configurations to ensure compliance with security baselines for new tools deployed throughout the organization.
- Identify and analyze threats to the organization, using OSINT, published vulnerabilities, Threat Intelligence, and enrichment resources.
- Build tailored reports for leadership to help communicate their specific threat landscape.
- Support incident detection, analysis, and response in a 24/7 SOC environment.
- Report outages or incidents following guidelines and procedures.
- Detect, analyze, and respond to incidents, coordinate with other stakeholders for containing, eradicating, and recovering from an incident.
- Assist in developing and testing SOC playbooks, threat hunting criteria, and detection rules.
- Contribute to modernization efforts that align with business needs and minimize risk.
- Assist in developing testing criteria to implement new signatures/rules.
Other
- Perform all other duties as assigned.
- Participate in on-call rotations, including nights, weekends, and holidays.
- Remains compliant with our policies, processes and legal guidelines.
- Works primarily remotely with some occasional travel to a Credit Acceptance building.
Competencies: The following items detail how you will be successful in this role.
- Customer Empathy: Customer Empathy is the ability to understand the perspectives, pain points, and experiences of customers. It involves actively putting oneself in the customer’s shoes, comprehending their needs and challenges, and using that understanding to provide a better, more customer-centric experience.
- Engineering Excellence: Engineering Excellence is about bringing great craftsmanship and thought leadership to deliver an outstanding product that delights customers and solves for the business. This involves the pursuit and achievement of high standards, best practices, innovation, and superior solutions.
- One Team: A One Team mindset refers to a collaborative approach across the organization, where individuals work together seamlessly, without boundaries, as a single, cohesive team. Shared goals, open communication and mutual support create a sense of collective purpose. This enables teams to navigate challenges and pursue shared objectives more effectively.
- Owner’s Mindset: Owner’s Mindset involves adopting a set of behaviors that reflect a sense of responsibility, accountability, strategic thinking, and a proactive approach to managing your domain. As an owner, you understand the business and your domain(s) deeply and solve for the right outcome for the domain(s) and the business.
Requirements:
- Bachelor’s degree in computer science, Information Systems, Data Science or closely related field of study or equivalent experience
- Minimum 2 years of experience in cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), operations incident response, network security or Vulnerability assessment activities
- Experience administering, deploying and managing security tools.
- Experience with vulnerability management workflows and risk analysis.
- Ability to produce formal and informal reports, briefings, and analysis of actual and potential attacks against technologies.
- Understanding of how vulnerabilities impact business operations.
- Experience with Endpoint Detection and Response (EDR) or Intrusion Detection System or Intrusion Prevention System (IDS/IPS) monitoring tools.
- Knowledge of common security threats, vulnerabilities, and mitigation strategies.
- Knowledge of general OS concepts, including Windows, Linux, or Mac.
- Familiarity with the MITRE ATT&CK Framework and Cyber Kill Chain flow.
- Understanding of incident response processes and risk management.
- Ability to identify and assess threats relevant to the organization.
Preferred:
- Actively hold one or more of the following certifications:
- CompTIA: Cybersecurity Analyst (CySA), Security +, CompTIA Advanced Security Practitioner (CASP+)
- SANS: GIAC Certified Incident Handle (GCIH), Certified Forensic Analyst (GCFA), Cyber Threat Intelligence (GCTI)
- Certified Threat Intelligence Analyst (CTIA)
- Certified SOC Analyst (CSA) Or SIEM Related certifications
- EDR Related certifications
- Understands Credit Acceptance’s business model, operations and business terminology.
Knowledge and Skills:
- Understanding of breach methodologies and advanced attack methodologies, including living off the land; TTPs outlined in MITRE ATT&CK framework
- Knowledge of Common Vulnerabilities and Exposures (CVEs), cyber threats, and vulnerability mitigation strategies.
- Understanding of what constitutes network risk, cyberattacks, and the relationship between threats and vulnerabilities
- Demonstrates pride in work with a high attention to detail and a sense of urgency in meeting goals
- Critical thinking and proactive problem-solving skills
- Quick learner with the ability to apply new concepts effectively
- Skilled at managing multiple priorities and optimizing resources
- Self-motivated with the ability to identify and act on tasks independently.
- Clear and effective communicator, both written and verbal, tailored to the audience
- Influences without authority and demonstrates leadership in cross-functional settings
- Synthesizes complex information from multiple sources to drive sound decisions and the best possible outcomes
- Actively listens and understands context to respond appropriately
- Recognizes and escalates risks through appropriate channels in a timely manner
Target Compensation: A competitive base salary range from $85,000.00- $100,000.00. This position is eligible for an annual variable cash bonus, between 7.5 - 15%. Final compensation within the range is influenced by many factors including role-specific skills, depth and experience level, industry background, relevant education and certifications.
Candidates who reside in the following major metropolitan areas may be eligible for a premium on top of the posted range based on their specific zone: San Francisco, Seattle, Boston, New York City, Los Angeles and San Diego.
Benefits
- Excellent benefits package that includes 401(K) match, adoption assistance, parental leave, tuition reimbursement, comprehensive medical/ dental/vision and many nonstandard benefits that make us a Great Place to Work
Our Company Values:
To be successful in this role, Team Members need to be:
- Positive by maintaining resiliency and focusing on solutions
- Respectful by collaborating and actively listening
- Insightful by cultivating innovation, accumulating business and role specific knowledge, demonstrating self-awareness and making quality decisions
- Direct by effectively communicating and conveying courage
- Earnest by taking accountability, applying feedback and effectively planning and priority setting
Expectations:
- Remain compliant with our policies processes and legal guidelines
- All other duties as assigned
- Attendance as required by department
Advice!
We understand that your career search may look different than others. Our hiring team wants to make sure that this would be a fit not just for us, but for you long term. If you are actively looking or starting to explore new opportunities, send us your application!
P.S.
We have great details around our stats, success, history and more. We’re proud of our culture and are happy to share why – let’s talk!
Required degrees must have been earned at institutions of Higher Education which are accredited by the Council for Higher Education Accreditation or equivalent.
Credit Acceptance is dedicated to providing a safe and inclusive working environment for all. As part of our Culture of Compliance, we are proud to be an Equal Opportunity Employer and value our culturally diverse workforce. All qualified applicants will receive consideration for employment regardless of the person’s age, race, color, religion, sex, gender, sexual orientation, gender identity, national origin, veteran or disability status, criminal history, or any other legally protected characteristic.
California Residents: Please click here for the California Consumer Privacy Act (CCPA) notice regarding the personal information Credit Acceptance may collect from you.
Play the video below to learn more about our Company culture.
Tags: Analytics APIs Automation CASP+ CCPA Compliance CompTIA Computer Science Cyber Kill Chain EDR Finance GCFA GCIH GCTI GIAC IDS Incident response Intrusion detection Intrusion prevention IPS Linux MITRE ATT&CK Monitoring Nessus Network security OSINT Privacy Qualys Risk analysis Risk management SANS SIEM SOC Threat intelligence TTPs Vulnerabilities Vulnerability management Windows
Perks/benefits: 401(k) matching Career development Competitive pay Health care Medical leave Parental leave Salary bonus Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.