FreshRemote.Work

Threat Responder - Remote

Come join Deepwatch’s team of world-class cybersecurity professionals and the brightest minds in the industry. If you're ready to challenge yourself with work that matters, then this is the place for you. We're redefining cybersecurity as one of the fastest growing companies in the U.S. – and we have a blast doing it!

Who We Are

Deepwatch is the leader in managed security services, protecting organizations from ever-increasing cyber threats 24/7/365. Powered by Deepwatch’s cloud-based security operations platform, Deepwatch provides the industry’s fastest, most comprehensive detection and automated response to cyber threats together with tailored guidance from dedicated experts to mitigate risk and measurably improve security posture. Hundreds of organizations, from Fortune 100 to mid-sized enterprises, trust Deepwatch to protect their business. 

Our core values drive everything we do at Deepwatch, including our approach to tackling tough cyber challenges. We seek out tenacious individuals who are passionate about solving complex problems and protecting our customers. At Deepwatch, every decision, process, and hire is made with a focus on improving our cybersecurity solutions and delivering an exceptional experience for our customers. By embracing our values, we create a culture of excellence that is dedicated to empowering our team members to explore their potential, expand their skill sets, and achieve their career aspirations, which is supported by our unique annual professional development benefit.

Deepwatch recognition includes:

  • 2023, 2022 and 2021 Great Place to Work® Certified
  • 2023 and 2022 Forbes America’s Best Startup Employers
  • 2023 and 2022 Fortress Cybersecurity Award
  • 2023 $180M Series C investment from Springcoast Capital Partners, Splunk Ventures, and Vista Credit Partners of Vista Equity Partners
  • 2022 Cigna Healthy Workforce Silver Designation
  • 2022 Cybersecurity Excellence Award for MDR

Position Summary

Reporting directly to the Manager, Adversary Response the Threat Responder will work within the Incident Response processes, engage with outside IR (Incident Response) firms, and internal customers.  The Threat Responder will be a primary response analyst during IR engagements, utilizing a myriad of EDR tools (CrowdStrike, SentinelOne, Cybereason, etc.).  They will support the response efforts of the IR team and squad as necessary. 

In this role, you’ll get to:

  • Provide Incident Response support and perform investigations in customer environments
  • Validate suspicious events and incidents by using open-source and proprietary intelligence sources
  • Report, document, and manage incidents in a case management system
  • Document new tools and techniques and disseminate them to the rest of the team
  • Keep up-to-date with information security news, techniques, and trends
  • Escalate any gaps in log collection or reporting as soon as possible, if identified
  • Provide subject matter expertise while working with internal teams to produce content regarding new threats, techniques, and information for internal and external consumption (hunts, dashboards, alerts, reports, SOAR  workbooks, use cases, blogs, etc.)
  • On an ad-hoc basis, respond to customers to resolve issues, provide additional information, and answer questions related to incidents and hunt efforts

To be successful in this role, you’ll need to:

  • Have proven experience in Cybersecurity Operations
  • Be experienced with Incident Handling and Response
  • Possess experience in Endpoint Detection and Response Tools such as SentinelOne and Crowdstrike
  • Demonstrate experience communicating with and presenting to customers
  • Possess experience with Operating Systems and Networks
  • Possess experience in leveraging common IR frameworks (e.g. PICERL, NIST)
  • Possess experience in SOAR, Ticketing Systems and Threat Intelligence platforms
  • Possess experience in Velociraptor and Splunk
  • Have an understanding of attacker methodology including the tactics, techniques, and procedures
  • Demonstrate Subject Matter Expertise (SME) in at least one of the following areas: 
  • Digital Forensics & Incident Response (DFIR)
  • Malware Analysis
  • Reverse Engineering
  • Threat Intelligence
  • Network Traffic Analysis
  • Threat Hunting
  • Penetration Testing

 

ITAR Compliance

This position will have access to customer data and as such is subject to International Traffic in Arms Regulations (ITAR). Upon application, candidates will be asked to confirm that they are a U.S. Person as defined by the following:

  • A citizen of the U.S.;
  • A lawful permanent resident of the United States; 
  • A person admitted to the United States as a refugee; or
  • A person that has been granted asylum by the United States government.

The intent of this requirement is not to verify employment eligibility overall, but to ensure compliance with import/export regulations. If you do not meet these requirements, we encourage you to apply for other open roles at Deepwatch. This information will be verified upon offer of employment.

Statutory Pay Disclosure:

For applicants in NYC, CO, CA, RI, and WA, the salary range for this role is $106,250 to $150,000 + stock options + benefits. Actual compensation may vary from posted hiring range based upon geographic location, work experience, education, and/or skill level.

#LI-KH1

 

What We Offer:

Deepwatch is excited to provide benefits designed to support team members and their families. Including:

  • Medical, dental, vision, and disability insurance
  • Flexible Time Off (FTO), 9 company holidays, sick leave and 8-Weeks Paid Parental Leave
  • Unique professional development benefits, starting at $3,000 annually
  • Wellness contests and monthly educational programs
  • 401(K) retirement program with employer match
  • Learn more here: Deepwatch Benefits

We know the confidence gap and imposter syndrome can get in the way of meeting spectacular candidates, so please don’t hesitate to apply — we’d love to hear from you.  Please review our DEI Statement here.

Deepwatch welcomes and encourages applications from people with disabilities and accommodations are available on request for candidates taking part in all aspects of the selection process. Please inform your recruiter or contact recruiting@deepwatch.com for further information.

All Deepwatch employees are expected to:

  • Be interested in and able to work remotely from a home office when not at a corporate office
  • Pass a pre-employment background and drug screen in accordance with applicable laws

Deepwatch is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability status, marital status, sexual orientation, gender identity, genetic information, protected veteran status, or any other characteristic protected by law.  In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.

By submitting your application, you agree that Deepwatch may collect your personal data for recruiting, global organization planning, and related purposes. The Deepwatch Privacy Policy explains what personal information we may process, where we may process your personal information, our purposes for processing your personal information, and the rights you can exercise over Deepwatch’s use of your personal information. 

Apply

Job Profile

Benefits/Perks

Annual professional development benefit Professional development benefit Unique annual professional development benefit

Skills

CrowdStrike Cybersecurity Cybersecurity Operations Endpoint Detection and Response Tools Incident Handling and Response Incident Response IR Frameworks (e.g. PICERL, NIST) Operating Systems and Networks Security Operations SOAR Splunk Threat Intelligence

Tasks
  • Analysis
  • Document new tools
  • Document new tools and techniques
  • Escalate gaps in log collection
  • Incident handling
  • Perform investigations in customer environments
  • Provide Incident Response support
  • Provide Subject Matter Expertise
  • Report and manage incidents
  • Respond to customers to resolve issues
  • Stay updated with security news and trends
  • Validate suspicious events and incidents
Education

Engineering