Security Engineer
Stockholm, Stockholm County, Sweden
Applications have closed
Sinch
Unlock meaningful conversations across the customer journey with programmable SMS, voice, email, video, & verification APIs!About Us
Sinch is a global leader in cloud communications, helping businesses connect with their customers on their mobile phones. We reach every phone on earth, with over 147 billion conversations every year. Our technology powers the world's leading communications platforms.
The Security Engineer plays a crucial role in incident response and developing strategies to prevent future attacks. This position requires strong analytical and communication skills, as well as a commitment to staying up to date with the latest trends and best practices in cybersecurity.
You will be responsible for designing, implementing, and maintaining security protocols to safeguard sensitive information, such as customer data and company intellectual property. Must have a deep understanding of networking and system architecture, as well as knowledge of current and emerging threats and technologies.
Responsibilities
- Responsible for assessing and understanding the threat landscape by working with other Cyber functions such as Offensive Security, Digital Forensics etc. and architecting solutions to calibrate risk consistent with Phreesia risk tolerance.
- Reviewing security intelligence information and researching emerging threats - to proactively identify and prevent potential threats.
- Build and/or tune Sinch security tools, such as EDR, email security, and vulnerability scanning and SIEM solution to ensure that alerts are effective and actionable.
- Augment Incident Response team to ensure 24/7 coverage and operations. Responsibilities sometimes will require working evenings and weekends, sometimes with little or no advanced notice.
- Be able to effectively communicate, both written and verbally, complex security and technical concepts to a wide variety of stakeholders and partners and build and leverage and earn the trust of stakeholders at all levels of the organization.
- Establish and modify runbooks that provide other subject matter experts with a consistent manner of executing the processes.
- Employing the security technologies to continuously monitor the company’s assets, conduct technical analysis of network traffic to identify anomalies and then taking action to respond to potential vulnerabilities and threats.
Requirements
- Proven experience in working on threat, vuln, fraud or compliance - ideally building or supporting cross-functional mitigation programs.
- A background that involves creating a layered security perimeter in the context of a cloud- and container-based microservices.
- Experience supporting (or building) a security operations function in startup environments, ideally serving as incident commander for security incidents.
- Knowledge of networking fundamentals, including TCP/IP, OSI stack model, L2, L3 and L7 fundamentals and raw packet analysis. Fluency with common cryptographic modalities
- Experience using tools like LogRhythm, Nessus, CASB manage threat telemetry.
- One industry-recognized security certification (CEH, CISSP, CCSP, CISA) -- or the willingness to secure one within six months.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CASB CCSP CEH CISA CISSP Cloud Compliance EDR Forensics Incident response LogRhythm Microservices Nessus Offensive security SIEM TCP/IP Vulnerabilities
Perks/benefits: Startup environment
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Security Specialist jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open Windows-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs