Lead Cyber Operations Engineer

Provo, Utah, USA

Applications have closed

Arctic Wolf Networks

Arctic Wolf delivers dynamic 24x7 cybersecurity protection tailored to the specific needs of your organization. Ready to boost your security posture?

View company page

Ready to make an impact? Arctic Wolf is looking for a Lead Cyber Operations Engineer to join our pack.

Arctic Wolf, with its unicorn valuation, is the leader in security operations in an exciting and fast-growing industry—cybersecurity.

How fast are we growing? Well, Arctic Wolf was highly ranked in the Deloitte Fast Technology 500 for NorthAmerica in both 2019 (#25) and 2020 (#104)! We have doubled headcount, customers, and revenue for five years running. We are also cultivating a collaborative and productive work environment that welcomes a diversity of backgrounds, cultures, and ideas to make our teams even stronger as we grow our teams globally.

In fact, we were named a 2021 Top Workplace USA (Energage) as the top technology firm to work in our size category, were recognized as one of the 2020 Best Places to Work (bizjournals.com), and most recently were certified as a 2021 Great Place to Work (Great Places to Work Institute, Canada). Arctic Wolf believes in corporate responsibility, and our worldwide offices proudly participate in volunteer programs throughout their communities. We’ve also earned distinction from TravelWise for our efforts in promoting sustainable transportation.

Position Overview and Objective 

The Lead Cyber Operations Engineer - Vulnerability Management role provides support for detection, assessment, communication, and remediation coordination of security vulnerabilities at Arctic Wolf.  

Primary Responsibilities and Duties 

  • Manage the entire lifecycle of a vulnerability, from discovery, triage, advising, remediation, and validation. 
  • Perform comprehensive vulnerability assessments and continuous monitoring across the organization. 
  • Work with various business units to perform vulnerability assessments on systems or applications before deployment. 
  • Examine systems and applications to assess the current security posture. 
  • Manage vulnerability related findings to ensure issues are remediated within proper timelines. 
  • The ability to effectively partner and communicate with stakeholders throughout the company 
  • Security metrics delivery and improvements 

Key Skills 

  • Communication
  • Threat modeling
  • Code Review
  • Penetration Testing
  • Application Testing
  • Research 

Key Competencies 

  • Is able to write clearly and succinctly in a variety of communication settings and styles; can get messages across that have the desired effect. 
  • Uses rigorous logic and methods to solve difficult problems with effective solutions; probes all fruitful sources for answers; can see hidden problems; is excellent at honest analysis; looks beyond the obvious and doesn't stop at the first answers. 
  • Comes up with a lot of new and unique ideas; easily makes connections among previously unrelated notions; tends to be seen as original and value-added in brainstorming settings. 

Minimum Qualifications 

  • A Bachelor’s Degree in Computer Science, Information Systems, Engineering, cybersecurity or related technical field; or equivalent experience. 
  • 3+ years of experience in security or infrastructure engineering Including assessing and escalating to vendors for troubleshooting purposes. 
  • Experience with one or more vulnerability management scanners and/or web application scanners (e.g. Tenable, Rapid7, Qualys, etc.). 
  • Experience working with various operations systems (e.g. macOS, Windows, and/or Linux flavors). 
  • The ability to triage and validate vulnerabilities and tool findings 
  • Stays up to date with security related news and emerging vulnerabilities. 

Preferred Qualifications 

  • Ability to automate and script tasks using your preferred language (e.g. Python, BASH, etc..) 
  • Knowledge of cloud platforms, dynamic cloud environments, and cloud security. 
  • Knowledge of containerization technologies 
  • Experience working in a regulated environments (SOX, ISO 27001, etc) 

Environment and Physical Demands 

  • Work is primarily sedentary in nature and can be executed sitting or standing positions in an office environment.  
  • Requires ability to utilize technology related to using a keyboard, verbal communication, and work with device screens which require visual acuity. 
  • If located in a company office, often requires the mobility to physically navigate the space.  
  • In the event of business travel, mobility sufficient to utilize public and private transport and navigate to essential locations. 
  • May include moving or lifting of 25 pounds or less (e.g. office chair, reams of paper).   

Travel Requirements 

  • Typically 10% or less of business travel 

Security Requirements:

  • Conducts duties and responsibilities in accordance with AWN’s Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information.
  • Background checks are required for this position

About us:

At Arctic Wolf, we recognize that success comes from delighting our customers. We believe in being lean – in constantly building, measuring, and learning in all aspects of our business. We truly value people. All wolves are welcome to join the Arctic Wolf pack, with compelling compensation packages, benefits, and equity for employees.

Arctic Wolf is focused on building a workforce that is diverse and inclusive. If you’re excited about this role, but do not meet all of the qualifications listed above, we encourage you to apply. We review all applications.  

Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law.

Arctic Wolf is committed to fostering a welcoming, accessible, respectful and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our recruitment, assessment and selection processes as accessible as possible and provide accommodations as required for applicants with disabilities. Please let us know if you require any accommodations by emailing recruiting@arcticwolf.com

Tags: Bash Cloud Computer Science ISO 27001 Linux MacOS Monitoring Pentesting Python Qualys Vulnerabilities Vulnerability management Windows

Perks/benefits: Career development Equity

Region: North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.