Staff SOC Engineer, Digital Forensics

Posted:
8/23/2024, 8:34:49 AM

Location(s):
San Francisco, California, United States ⋅ California, United States

Experience Level(s):
Senior

Field(s):
IT & Security

Workplace Type:
Remote

Pay:
$31/hr or $64,480 total comp

Do you ever wonder what happens inside the cloud?

DigitalOcean (NYSE: DOCN) simplifies cloud computing so builders can spend more time creating software that changes the world. With our mission-critical infrastructure and fully managed offerings, DigitalOcean enables startups and small and medium-sized businesses (SMBs) to rapidly deploy and scale modern applications. As a remote-first organization, our employees, like our customers, are based around the world.

We want people who are passionate about making the internet a safer place for everyone.

We are looking for an inspired and motivated experienced technical leader to join the DigitalOcean Security Operations Center (SOC).  In this role, you will be the lead technical contributor on DigitalOcean’s Digital Forensics and Incident Response (DFIR) team, charged with improving the security posture of DigitalOcean both reactively and proactively, ensuring a secure cloud infrastructure for both customers and internal users. You will leverage advanced knowledge of DFIR and enterprise security practices. You will use your deep analytical skills to develop mitigations to prevent malicious harms. You will apply engineering skills to mature our detection and response functions. 

With over 600,000 customers utilizing 11 data centers and 15,000+ hypervisors every day, our Security Operations Center never loses sight of the role we play in making the internet a more secure place for everyone.

What You’ll Be Doing:

  • Establish an understanding of DigitalOcean’s entire production environment, from applications to infrastructure, keeping up-to-date with material changes and future directions.
  • Lead live intrusions and incident response investigations with on-call responsibilities, in a customer-oriented and transparent manner, to minimize the impact of malicious actors.
  • Collect digital artifacts from cloud, on-premise, and employee systems for analysis to reconstruct what may have occurred on a system leveraging digital forensics methodologies.
  • Use advanced network traffic analysis techniques to identify compromised systems, negate denial of service attacks, and pinpoint resource anomalies.
  • Identify trends in malicious activity, inform leadership, and perform preventative measures.
  • Act as a point of contact for security and related incidents: providing supporting data for critical issues, downtime events, root causes, and post-mortem reports.
  • Build tools to identify and automate response to malicious activity with enhancements to refine incident response procedural documentation as needed.
  • Build strong relationships with technical teams across all business functions to harden account, platform, and service structures to combat intrusions, compromises, and disruptions.
  • Effectively communicate and collaborate with staff including legal counsel, trust & governance, and executive leadership.
  • Engage in R&D efforts to identify and develop the latest forensic tools, techniques, and procedures.
  • Implement technical recommendations that mature incident response and digital forensics capabilities.
  • Provide comprehensive feedback and technical advice to juniors and peers to increase team maturity and speed of advancement.

What We’ll Expect From You:

  • 10+ years minimum, of job related experience leading live incident response activities transparently, in a fast-paced team environment where accuracy of analysis determines business impact.
  • Ability to differentiate between normal and unusual resource usage patterns in customer and employee network/system behaviors in order to hunt for subtle anomalous patterns.
  • Hands-on experience with both dead-disk and live digital forensics, especially on Linux or Unix systems using open source tools (eg, volatility, sleuthkit) in an enterprise production environment at cloud scale.
  • Data analysis skills, including familiarity with relational databases, structured query languages, logging infrastructures, and data visualization tools.
  • Familiarity with basic static and dynamic malware analysis for triage, identification, prioritization, and remediation of new malware families and behaviors (e.g: x86 assembly, binary analysis).
  • A high degree of curiosity and aptitude, with a clear passion for security and the desire to keep our employees, customers, and the internet safe.
  • Clear written and verbal communication skills to include; technical writing, presenting, coaching, mentoring.
  • A proven track record of improving enterprise and operational security as the business scales, driving continuous improvement through data collection, correlation, and control enhancements.
  • Five or more years of experience maturing hands-on forensics and incident response protocols.
  • Ability to conduct vulnerability analysis, scoping, and mitigation planning for the internal employee environment. 
  • Ability to perform comprehensive threat intelligence analysis based on proactive hunts with clear and concise dissemination of findings.
  • Ability to perform network protocol analysis and design of internal applications to recommend design changes as needed.
  • Proven coding skills to develop automations and custom tools reducing time and complexity.

Why You’ll Like Working for DigitalOcean:

  • We are proud to work here. You’ll be a part of a cutting-edge technology company with an upward trajectory, who are proud to simplify cloud computing so builders can spend more time creating software that changes the world. As a member of the team, you will be a Shark who thinks big, bold, and scrappy, like an owner with a bias for action and a powerful sense of responsibility for customers, products, employees, and decisions. 
  • We prioritize career development. At DO, you’ll do the best work of your career. You will work with some of the smartest and most interesting people in the industry. We are a high-performance organization that will always challenge you to think big. Our organizational development team will provide you with resources to ensure you keep growing. We provide employees with reimbursement for relevant conferences, training, and education. All employees have access to LinkedIn Learning's 10,000+ courses to support their continued growth and development.
  • We care about your well-being. Regardless of your location, we will provide you with a competitive array of benefits to support your overall well-being, from one-time work from home stipend to wellness allowance to flexible time off policy, to name a few. While the philosophy around our benefits is the same worldwide, specific benefits may vary based on local regulations and preferences.
  • We reward our employees. The salary range for this position is between $150,000 - $220,000 based on market data, relevant years of experience, and skills a premium would apply to SF. You may qualify for a bonus in addition to base salary; bonus amounts are determined based on company and individual performance. We also provide equity compensation to eligible employees, including equity grants upon hire and the option to participate in our Employee Stock Purchase Program.
  • We value diversity and inclusion. We are an equal-opportunity employer, and recognize that diversity of thought and background builds stronger teams and products to serve our customers. We approach diversity and inclusion seriously and thoughtfully. We do not discriminate on the basis of race, religion, color, ancestry, national origin, caste, sex, sexual orientation, gender, gender identity or expression, age, disability, medical condition, pregnancy, genetic makeup, marital status, or military service.

*This is a remote role

#LI-Remote