Senior Security Operations Engineer
Oslo
Cognite
Deliver a step-change in productivity, safety, and performance with unified, trustworthy industrial data for every use case.Learn more about Cognite hereCognite Product Tour 2024Cognite Product Tour 2023Data Contextualization Masterclass 2023
Our valuesImpact: Cogniters strive to make an impact in all that they do. We are result-oriented, always asking ourselves.Ownership: Cogniters embrace a culture of ownership. We go beyond our comfort zones to contribute to the greater good, fostering inclusivity and sharing responsibilities for challenges and success. Relentless: Cogniters are relentless in their pursuit of innovation. We are determined and deliverable (never ruthless or reckless), facing challenges head-on and viewing setbacks as opportunities for growth.
About the role and the teamThe Security Operations team’s mission: “Through detection, enable teams and individuals to respond and recover. With analysis, improve the organization's ability to identify and protect”.
In the context of NIST Cybersecurity Framework (CSF) the Cognite Security Operations core activities reside in Detect and Protect. However, in order to ensure velocity and continuous improvement we have to avoid having a “throw-over-the-fence” culture - this is deeply embedded in Cognite’s culture and reflected in our values. Orchestration and automation are key to achieving the above. The Security Operations team should always seek to offload work to software and machines. We should avoid doing the same thing twice in all our work.
You will have the opportunity to shape and influence how we work as a team and as an organization, e.g. by presenting your proposals in an architecture forum, receiving feedback from product managers, developers, engineers and architects.
As a team we support the development of junior staff members to gain greater perspective on IT and OT security, and customer expectations and usage patterns.
Role and responsibilities
- As a Senior Security Operations Engineer in Cognite Security Operations, you are at the center of security events. To achieve our mission, we are integrated in the business. This applies to the input the team receives and how the output is delivered. We base and prioritize our work on business needs, and in return, we provide actionable insights and, where possible, concrete actions.
- Threat and vulnerability discovery: Continuous work to improve Cognite’s risk posture by proactively hunting for threats (internal and external) and detecting vulnerabilities across all environments.
- Threat modeling: Facilitate and/or be a subject-matter expert in threat modeling, where teams identify threats and corresponding mitigations.
- Culture and awareness: Contribute to Cognite’s security culture and awareness program by identifying areas of improvement using operational insight and actively participating in the development and delivery of training.
- Security Operations Rotation: The team has a shield rotation, in which the team members act as the initial point of contact for signals we receive.
- Triage signals (events, alerts, and requests): If possible, respond initially and escalate to applicable individuals/teams when required.
- Security Response Lead (SRL): SRL is a situational role that all team members can assume as part of Congite’s incident process. Contributions to the response and recovery include (but is not limited to) threat hunting, log investigations, configuration changes and reporting.
- Analyze: Perform queries and analyze results across a large amount of data from a wide range of sources. Correlate information and events to produce insights that enable the organization to identify risks and make protective measures to mitigate them.
- Develop: Integrate new and improve existing data sources to ensure high quality and value input. Produce high-quality output by writing, testing, and deploying software-powered logic to enrich analysis and alerting and drive innovation in orchestration and automation.
Organizational preparedness
Real-time posture
Drive improvements
Who you are
- We are keen to find a candidate with relevant experience on technologies we use. We seek a candidate with demonstrated grit and an interest in technology that drives you to learn, adopt and improve how we work.
- Threat modelling (STRIDE etc.)
- Secure CI/CD in cloud environments
- Infrastructure as a Code (IaC)
- Software Development Lifecycle( SDLC)
- Git and GitOps
- Security orchestration (SIEM, XDR, SOAR)0
- Security compliance (ISO 27001 and SOC2)
- Security Framework (NIST CSF)
- Security architecture model; Zero trust
- Vulnerability management (assessment and pen.testing)
- Google Cloud Platform
- Google Workspace
- Microsoft Azure
- Microsoft 365
- AWS
- Lacework
- GitHub
- Kubernetes
- Jamf Pro
- Jamf Protect
- Microsoft Intune
- Microsoft Defender
- Jenkins
- Spinnaker
- Terraform
- Windows
- Linux
- Mac
Practices, methodologies and frameworks
Technologies
Why choose Cognite? 🏆 🚀Join us in making a real and lasting impact in one of the most exciting and fastest-growing new software companies in the world. We have repeatedly demonstrated that digital transformation, when anchored on strong DataOps, drives business value and sustainabilityfor clients and allows front-line workers, as well as domain experts, to make better decisions every single day. We were recognized as one of CNBC's top global enterprise technology startups powering digital transformation! And just recently, Frost & Sullivan named Cognite a Technology Innovation Leader! 🥇 Most recently Cognite Data Fusion® Achieved Industry First DNV Compliance for Digital Twins 🥇
Apply today!If you're excited about the opportunity to work at Cognite and make a difference in the tech industry, we encourage you to apply today! We welcome candidates of all backgrounds and identities to join our team. Please do not hesitate to contact our Talent Acquisition team with any questions -
We encourage you to follow us on Cognite LinkedIn; we post all our openings there.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation AWS Azure CI/CD Cloud Compliance GCP GitHub Industrial ISO 27001 Jamf Jenkins Kubernetes Linux NIST SaaS SDLC SIEM SOAR SOC 2 Terraform Vulnerabilities Vulnerability management Windows XDR Zero Trust
Perks/benefits: Competitive pay Fitness / gym Health care Snacks / Drinks Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.