Overview:
Salesforce - the leader in enterprise cloud computing and #1 place to work according to Fortune magazine - is seeking a Lead Incident Responder with a passion for Information Security and an understanding of responding to security incidents in an enterprise environment.
The Customer Incident Response (CIR) team at Salesforce deals with some of the most challenging information security problems our customers face. The pace and variety of our work creates a unique learning environment. Whether you are starting out or have deep security experience, you will be given unique challenges and the tools to solve them, surrounded by exceptional colleagues, and supported by incredibly helpful partner teams.
Responsibilities:
The Lead Incident Responder is responsible for technical investigations in response to high severity incidents. This can variously include network forensics, log analysis, and working with a variety of technical stakeholders collaboratively to direct investigations. A successful Lead Incident Responder possesses a unique set of skills and qualities that set them apart in their field. They excel in challenging situations, remaining calm and composed under pressure, and are able to think quickly and strategically to effectively address and resolve incidents.
1. Provide advanced technical knowledge to incident responders to aid in the identification and containment of incidents.
2. Function as a technical lead on complex investigations, coordinating with stakeholder technical SMEs.
3. Analyze large or complicated evidence items from security incidents and synthesize the results to aid in progressing incidents.
4. Perform advanced host and network forensics.
5. Perform advanced log analysis using a variety of tools.
6. Create detailed timelines and other supporting documentation.
7. Review peers and individual contributors work and train peers and individual contributors on advanced analysis techniques.
8. Lead customer calls related to customer owned incidents.
9. Work with partner teams to provide technical analysis of cases to assist in the development of mitigation and detection techniques.
10. Lead efforts to assist customers in complying with regulatory notifications and provide valuable information on threat actor tactics for DORA.
11. Turn technical analysis into high-quality incident after-action reports to include Root Cause assessment for DORA customers.
Required Skills:
1. 5-7 years experience in information security or closely related roles, with direct experience in security incident response.
2. Deep understanding of Salesforce Platform.
3. Ability to manage and constantly triage multiple security incidents, differentiating urgent issues from the merely important.
4. Ability to meet with customers and communicate complex technical concepts to a non-technical audience.
5. Ability to stand back from a complex problem, logically assess the facts, and formulate a plan of action - even in the worst of situations.
6. Experience managing common types of security incidents, e.g., application or OS compromise, endpoint compromise, internal and external data exposure.
7. Familiarity with common threats and issues leading to security incidents, e.g., common forms of malware, credential phishing, "drive by" host compromises, internal data spillage events, and inadvertent data leaks.
8. Superior verbal and written communication skills, including the ability to effectively and clearly communicate complex scenarios to non-technical colleagues.
9. Exceptional technical basics, including networking fundamentals, common application protocols, system architecture, and basics of software development.
10. Strong Linux and MacOS knowledge, including familiarity with key security controls and preferably some shell scripting experience.
11. Exceptional log analysis skills, including experience extracting data from complex SQL or Hadoop-type data stores.
12. Ability to research and learn unfamiliar technologies quickly, adapting existing knowledge and processes to investigate and resolve security issues.
13. Broad information security knowledge, including some familiarity with key regulations and standards relating to security incident response, as well as regional privacy and regulatory guidelines (e.g., PCI-DSS, GDPR, ISO 27001, DORA).
Desired Skills:
1. Salesforce Admin certified.
2. 3-5 years E-commerce security experience.
3. Prior experience in a large and complex organization, operating across numerous locations and with a high degree of change.
4. Experience with complex digital forensic cases or investigations, e.g., those with very large numbers of devices, exceptional data volumes, or unusual data sources.
5. Experience securing applications and infrastructure in Amazon Web Services, Google Cloud Platform, and or Azure.
6. Deep application security knowledge, with the ability to map an application vulnerability to exploitation indications and relevant investigative techniques.
7. Relevant incident response or information security certifications, such as SANS GCIA, SANS GCIH, SANS GCFA, SANS GNFA, Offensive Security OSCP.
#J-18808-Ljbffr