Staff Security Engineer, Insider Threat Detection and Response

San Francisco, CA

Applications have closed

Airbnb

Get an Airbnb for every kind of trip → 7 million vacation rentals → 2 million Guest Favorites → 220+ countries and regions worldwide

View company page

Airbnb is a mission-driven company dedicated to helping create a world where anyone can belong anywhere. It takes a unified team committed to our core values to achieve this goal. Airbnb's various functions embody the company's innovative spirit and our fast-moving team is committed to leading as a 21st century company.

Lead Security Engineer, Insider Threat Detection and Response

What is a Lead Security Engineer, Insider Threat Detection and Response at Airbnb?

The Detection and Response Team (DART) at Airbnb is focused on automating security detection, responding to security incidents, and working with partner teams to build capabilities that support the security incident response lifecycle. This is the front-line team that detects, investigates, and responds to security threats and malicious activity against Airbnb’s data, systems and infrastructure.

To further increase our coverage, the team is looking to build a mature and world-class insider threat program. This is a key technical leadership role to define and execute our vision for insider threat detection and response capabilities and process while mentoring other team members. As a lead security engineer, you will have direct impact building a new program through influence and technical leadership.

 

Responsibilities

  • Partner closely with stakeholders across the organization to help build and implement an Insider Threat Program to fit the company’s needs and goals.
  • Perform investigations of security incidents using your knowledge of digital forensics and data analytics.
  • Use your coding, data analytics and investigation skills to hunt, detect and respond to insider threats and help detect data abuse and data exfiltration at scale.
  • Build automation and detection models to support identification of anomalous activity and response activities to mitigate insider threats at scale.
  • Hunt for insider threats in our corporate and production environments to proactively identify anomalous activity.
  • Work side by side with our engineering teams to build advanced detection solutions to help keep systems and information safe, and partner closely with our Human Resources and Legal teams to carry out complex investigations.
  • Identify gaps in our infrastructure, and work with business partners to gain visibility through logging and detection.
  • Identify and consult on the design of countermeasures to mitigate insider threats in our environment.
  • Collaborate with cross-functional partner teams, such as Global Safety & Security teams, Legal, Privacy, and Engineering for efficient, large-scale coordinated response. 
  • Partner with stakeholders to contribute to Security Awareness messaging and Training.

Minimum Requirements:

  • 5+ years of hands-on in-depth knowledge and technical experience in security operations including investigations, incident response, incident management, digital forensics, threat intelligence, threat hunting, and/or detection engineering.
  • Bachelor's degree in a related technical field or equivalent practical experience.
  • Exposure to data science and analytics solutions applicable to the insider threat detection space.
  • Experience with Insider Threat technologies (SIEMs, Data Loss Prevention solutions, host forensic solutions).
  • Knowledge and familiarity of the Cyber Kill Chain Framework and MITRE ATT&CK Framework and how these apply to the insider threat landscape.
  • Self-motivated and creative problem-solver able to work independently with minimal guidance.
  • Ability to lead people in complex, ambiguous situations through influence and not authority.
  • Ability to work calmly and collaboratively in critical high-stress situations with expediency.  
  • Outstanding organizational, prioritization, and multitasking skills.
  • Experience automating security detection and response.
  • Experience in AWS services (EC2, S3, Lambda, RDS) preferred
  • We are not focused on specific tools but we often use Python, AWS, SQL, and more.

The starting base pay for this role is between $190,000 and $245,000. The actual base pay is dependent upon many factors, such as: education, experience, and skills. The base pay range is subject to change and may be modified in the future. This role may also be eligible for bonus, equity, benefits, and Employee Travel Credits.

Tags: Analytics Automation AWS Cyber Kill Chain EC2 Forensics Incident response Lambda MITRE ATT&CK Privacy Python S3 SQL Threat detection Threat intelligence

Perks/benefits: Salary bonus Team events

Region: North America
Country: United States
Job stats:  26  2  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.