Lead/Senior Incident Responder - CSIRT EMEA

Israel - Tel Aviv

Salesforce

Bieten Sie die beste Customer Experience mit einem einzigen CRM-Tool für Sales, Kundenservice, Marketing, Commerce & IT. Jetzt 30 Tage testen!

View all jobs at Salesforce

Apply now Apply later

To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.

Job Category

Enterprise Technology & Infrastructure

Job Details

About Salesforce

We’re Salesforce, the Customer Company, inspiring the future of business with AI+ Data +CRM. Leading with our core values, we help companies across every industry blaze new trails and connect with customers in a whole new way. And, we empower you to be a Trailblazer, too — driving your performance and career growth, charting new paths, and improving the state of the world. If you believe in business as the greatest platform for change and in companies doing well and doing good – you’ve come to the right place.

We’re Salesforce, the Customer Company inspiring the future of business with AI+ Data +CRM. We are the leader in enterprise cloud computing and one of the top 10 places to work according to Fortune magazine. Leading with our core values, we help companies across every industry blaze new trails and connect with customers in a whole new way. We empower you to be a Trailblazer, too — driving your performance and career growth, charting new paths, and improving the state of the world. If you believe in business as the greatest platform for change and in companies doing well and doing good – you’ve come to the right place!

Salesforce is seeking a Lead/Senior Incident Responder for our Cyber Security Incident Response Team (CSIRT) with a passion for Information Security and solid understanding of digital forensics, incident response and security monitoring.

The CSIRT is responsible for 24x7x365 security monitoring and rapid incident response across all Salesforce environments. We are the ‘tip of the spear’ and the last line of defense protecting company and customer data from our adversaries.

This position is based in our EMEA region and working hours correspond to our “follow the sun” operating model and shift according to daylight savings during the year. You are required to do on-call as part of a regular rotation.

Responsibilities

The Lead/Senior Incident Responder will lead a group of incident responders on high severity incidents to protect critical infrastructure and our customers’ data from the latest information security threats. You will act as a technical escalation point for the team and perform other security monitoring/incident response functions as needed. You will also lead significant strategic projects, focused on general security uplift, enhancements to detection and incident response capabilities.

Required skills

Minimum 8+ years of prior specialised security operations experience consisting of:

  • Operational experience responding to cybersecurity incidents in a production environment, including technical investigations, containment and remediation on large scale network compromises.

  • Operational experience performing incident response with Endpoint Detection and Response (EDR) solutions (i.e. Crowdstrike, Cybereason, etc).

  • Operational experience with security incident and event management (SIEM) solutions (i.e. Splunk, Google Security Operations, Microsoft Sentinel, etc).

  • Operational experience with monitoring devices (such as Security Service Edge solutions, network and host-based intrusion detection systems, web application firewalls, database security monitoring systems, firewalls/routers/switches, proxy servers, antivirus systems, file integrity monitoring tools).

  • Flexibility, drive, integrity, and creative problem-solving skills.

  • Familiarity with core concepts of security incident response and the security threat landscape (i.e. incident response phases, attack vectors, threat actors, vulnerabilities, IoCs, TTPs).

  • The ability to build strong relationships with peers both internal and external to your functional group, and with peers/professional organisations outside the company.

  • Customer-centric attitude and focus on providing outstanding service for customers and stakeholders.

  • Strong verbal and written communication skills; ability to communicate effectively and clearly to both technical and non-technical audiences.

  • Understanding of network fundamentals and common protocols (i.e. HTTPS, DNS, SMTP).

  • Understanding of operating system fundamentals and common DFIR tools and artifacts in macOS, Microsoft Windows, and/or Linux/Unix (file system, memory, running processes, network connections).

  • Understanding of incident response and security operations within public cloud environments (i.e. AWS, Azure, GCP).

  • The willingness to apply yourself to learning new skills.

Desired skills

  • Prior experience in a 24x7x365 operations environment.

  • Working proficiency with programming or scripting languages (e.g. Python, Bash, Go, PowerShell).

  • Ability to develop custom threat detection rules (i.e. YARA/IDS signatures).

  • Working knowledge of malware reverse engineering.

  • Relevant information security certifications, such as: CISSP, CISM, OSCP, SANS GCIH, GCIA, GCFA, GCFE, GX-IH, GX-FA and other related certifications.

  • Degree or equivalent relevant experience required. Experience will be evaluated based on the core competencies for the role (e.g. extracurricular leadership roles, military experience, volunteer roles, work experience, etc.)

Benefits & Perks:
Check out our benefits site which explains our various benefits, including wellbeing reimbursement, generous parental leave, adoption assistance, fertility benefits, and more.
Open to Flex (1-3 days/week in the office), or Office-Based (4-5 days/week in the office).

Check out our Salesforce Engineering Blog

*IN SCHOOL OR GRADUATED WITHIN THE LAST 12 MONTHS? PLEASE VISIT FUTURE FORCE FOR OPPORTUNITIES*

Accommodations

If you require assistance due to a disability applying for open positions please submit a request via this Accommodations Request Form.

Posting Statement

At Salesforce we believe that the business of business is to improve the state of our world. Each of us has a responsibility to drive Equality in our communities and workplaces. We are committed to creating a workforce that reflects society through inclusive programs and initiatives such as equal pay, employee resource groups, inclusive benefits, and more. Learn more about Equality at www.equality.com and explore our company benefits at www.salesforcebenefits.com.

Salesforce is an Equal Employment Opportunity and Affirmative Action Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender perception or identity, national origin, age, marital status, protected veteran status, or disability status. Salesforce does not accept unsolicited headhunter and agency resumes. Salesforce will not pay any third-party agency or company that does not have a signed agreement with Salesforce.

Salesforce welcomes all.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Antivirus AWS Azure Bash CISM CISSP Cloud CrowdStrike CSIRT DFIR DNS EDR Firewalls Forensics GCFA GCFE GCIA GCIH GCP IDS Incident response Intrusion detection Linux MacOS Malware Monitoring OSCP PowerShell Python Reverse engineering SANS Scripting Sentinel SIEM SMTP Splunk Threat detection TTPs UNIX Vulnerabilities Windows

Perks/benefits: Career development Fertility benefits Parental leave Startup environment

Region: Middle East
Country: Israel

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.