Cybersecurity Lead, Incident Response & SOC

Posted:
9/4/2024, 7:25:17 AM

Location(s):
California, United States ⋅ San Carlos, California, United States

Experience Level(s):
Expert or higher ⋅ Senior

Field(s):
IT & Security

Pay:
$151/hr or $314,080 total comp

POSITION TITLE: Cybersecurity Lead, Incident Response & SOC

POSITION LOCATION: San Carlos, CA

POSITION SUMMARY:

The Cybersecurity Lead, Incident Response & SOC is responsible for monitoring and response to all Information Security incidents (potential & actual).This role will also take critical responsibilities in attack surface management and related vulnerability testing and remediation.

PRIMARY RESPONSIBILITIES:

  • Lead with with high sense of urgency, operate, scale, and optimize InfoSec Incident response, security operation, and vulnerability management capabilitiesManage security incidents proactively, including threats monitoring, hunting, identification and acting on anomalous activity based on improvement in processes, tools and techniques

  • Lead and perform end-to-end incident response for all types of security events

  • Perform detailed analysis and risk evaluation of incidents, vulnerabilities, attack vectors, attack surfaces and detection avoidance tactics

  • Work with senior executives, regulatory authorities, and law enforcement as needed

  • Manage the day-to-day operation of the SOC and attack surface management collaborating with other team members. Work with stakeholders to timely remediate vulnerabilities

  • Constantly strive to improve earlier detection, response, and recovery operations by conducting a lesson learned exercise and communicating with Senior Management in IT and business

  • Ensure appropriate evidence handling and chain of custody for security incidents

  • Develop & enhance appropriate incident & vulnerability management dashboards in SIEM & and other tools to be able to report regularly on Vulnerability Risk and Security Incidents on an ongoing basis

  • Monitor external event sources for emerging vulnerabilities, threats and attack scenarios and influence/assist the other Information Security, Engineering, and IT teams to build appropriate controls to combat these threats

  • Lead Incident Response reporting to meet regulatory and compliance requirements

  • Collaborate with external Threat Intelligence sources to stay ahead of the threats before they can potentially impact Natera

  • Up-to-date knowledge on IR tools

  • Establish and maintain excellent working relationships/partnerships with the broader IT organization and business units

QUALIFICATIONS:

  • B.S. in Computer Science or related field, or equivalent experience

  • Minimum of 10 years of technical & operational cybersecurity experience, which includes a minimum of 5+ years of specific experience in large enterprise cybersecurity IR, security operations, tools and processes

  • Technically sound. Be able to accurately deep dive and investigate cybersecurity incidents under pressure. Deep experience in communicating cyber incidents precisely and professionally.  Muscle memory to execute with a strong sense of urgency. Be flexible to work off hours when needed. 

  • Solid Incident Response experiences in complex, large enterprise environment

  • Expert experiences in handling incident response to meet compliance requirements, such as HIPAA, SEC, NIST, etc.

  • Current Industry certificates:  PNSE, CEH, Security+, CCNA/CCNP, CISSP, etc. preferred

KNOWLEDGE, SKILLS, AND ABILITIES:

  • Excellent written and verbal communication skills; ability to convey security concepts to non-technical audiences (e.g. senior and executive management, internal customers)

  • Recent experience with the AWS and Google security stack 

  • Knowledge of operating systems (UNIX/Linux, MacOS X and Windows) and of database management systems (Oracle, SQL Server, etc.)

  • Experience with Security Event Information Management systems (SIEM), and Log Aggregation systems

  • Experience with Security Vulnerability Management tools

  • Experience with virtualization and cloud-based (AWS) networks

  • Capable of performing network forensics and ability to read packet captures

  • Experience with both Open Source and COTS Security Monitoring & Incident Response Tools

 

The pay range is listed and actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations.
San Carlos, CA
$172,400$215,450 USD

OUR OPPORTUNITY

Natera™ is a global leader in cell-free DNA (cfDNA) testing, dedicated to oncology, women’s health, and organ health. Our aim is to make personalized genetic testing and diagnostics part of the standard of care to protect health and enable earlier and more targeted interventions that lead to longer, healthier lives.

The Natera team consists of highly dedicated statisticians, geneticists, doctors, laboratory scientists, business professionals, software engineers and many other professionals from world-class institutions, who care deeply for our work and each other. When you join Natera, you’ll work hard and grow quickly. Working alongside the elite of the industry, you’ll be stretched and challenged, and take pride in being part of a company that is changing the landscape of genetic disease management.

WHAT WE OFFER

Competitive Benefits - Employee benefits include comprehensive medical, dental, vision, life and disability plans for eligible employees and their dependents. Additionally, Natera employees and their immediate families receive free testing in addition to fertility care benefits. Other benefits include pregnancy and baby bonding leave, 401k benefits, commuter benefits and much more. We also offer a generous employee referral program!

For more information, visit www.natera.com.

Natera is proud to be an Equal Opportunity Employer. We are committed to ensuring a diverse and inclusive workplace environment, and welcome people of different backgrounds, experiences, abilities and perspectives. Inclusive collaboration benefits our employees, our community and our patients, and is critical to our mission of changing the management of disease worldwide.

All qualified applicants are encouraged to apply, and will be considered without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, age, veteran status, disability or any other legally protected status. We also consider qualified applicants regardless of criminal histories, consistent with applicable laws.

If you are based in California, we encourage you to read this important information for California residents. 

Link: https://www.natera.com/notice-of-data-collection-california-residents/

Please be advised that Natera will reach out to candidates with a @natera.com email domain ONLY. Email communications from all other domain names are not from Natera or its employees and are fraudulent. Natera does not request interviews via text messages and does not ask for personal information until a candidate has engaged with the company and has spoken to a recruiter and the hiring team. Natera takes cyber crimes seriously, and will collaborate with law enforcement authorities to prosecute any related cyber crimes.

For more information:
- BBB announcement on job scams 
- FBI Cyber Crime resource page