Senior Security Incident Response Engineer
San Francisco, CA; New York, NY; Remote
About Rippling
Rippling gives businesses one place to run HR, IT, and Finance. It brings together all of the workforce systems that are normally scattered across a company, like payroll, expenses, benefits, and computers. For the first time ever, you can manage and automate every part of the employee lifecycle in a single system.
Take onboarding, for example. With Rippling, you can hire a new employee anywhere in the world and set up their payroll, corporate card, computer, benefits, and even third-party apps like Slack and Microsoft 365āall within 90 seconds.
Based in San Francisco, CA, Rippling has raised $1.4B+ from the worldās top investorsāincluding Kleiner Perkins, Founders Fund, Sequoia, Greenoaks, and Bedrockāand was named one of America's best startup employers by Forbes.
We prioritize candidate safety. Please be aware that all official communication will only be sent from @Rippling.com addresses.
About The Role
We are looking for a Senior Security Incident Response Engineer to join our Detection and Response Team (DART). In this role, you will be at the forefront of handling security incidents, working to investigate, contain, and mitigate threats across Ripplingās environments. You will play a pivotal role in developing and optimizing our incident response function, ensuring that security incidents are managed efficiently and effectively, while continuously improving our processes and infrastructure.
You will work alongside cross-functional teams to respond to complex security incidents, drive improvements in detection and response capabilities, and create scalable solutions to manage and address emerging threats. This is an opportunity to build out Rippling's incident response function from the ground up, providing leadership and technical expertise to secure our production and corporate environments
What You Will Do
- Lead and coordinate the response to security incidents, including triage, investigation, analysis, and communication to internal and external stakeholders.
- Develop and maintain incident response playbooks and runbooks for new and existing threat scenarios.
- Automate and optimize workflows for detection, incident analysis, and response, improving the speed and effectiveness of incident handling.
- Improve security detection capabilities through rule development, tuning, and proactive threat hunting to identify potential attack vectors.
- Conduct root cause analysis of incidents and suggest improvements to processes and technologies to prevent future occurrences.
- Collaborate with teams across Rippling to implement security measures and mitigation strategies that enhance detection and response capabilities.
- Provide expert input on the design and implementation of security controls, processes, and automation tools.
What You Will Need
- Strong communication ā¦
This job isn't fresh anymore!
Search Fresh JobsJob Profile
Benefits Competitive salary Diverse and inclusive workforce Equal opportunity employer Equity Reasonable accommodations
Tasks- Automate workflows
- Collaborate on security measures
- Collaborate with teams
- Conduct root cause analysis
- Improve detection capabilities
- Lead incident response
- Optimize workflows
Automation AWS Cloud Cloud Security Communication Hiring HR Implementation Incident analysis IT Leadership MITRE ATT&CK Onboarding Payroll Python Root Cause Analysis Security Security Incident Response SIEM SOAR Threat Hunting Workflows
Experience7 years
Education TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9