- Страна
- США
- Зарплата
- 142 900 $ – 207 200 $
Откликайтесь
на вакансии с ИИ

Senior Detection & Response Engineer
Отличная вакансия с прозрачным и высоким диапазоном зарплаты, удаленным форматом работы и сильной инженерной культурой. Компания предлагает отличные бонусы, включая неограниченный отпуск и поддержку профессионального роста.
Сложность вакансии
Роль требует глубоких знаний в области кибербезопасности (EDR, SIEM, тактики атак) и навыков разработки на Python или Go. Высокая планка обусловлена необходимостью не только находить угрозы, но и автоматизировать сложные процессы реагирования.
Анализ зарплаты
Предлагаемая зарплата ($142k - $207k) находится на верхнем уровне рыночных ожиданий для Senior-позиций в США, особенно для удаленной работы. Это подчеркивает высокую ценность роли для компании.
Сопроводительное письмо
I am writing to express my strong interest in the Senior Detection & Response Engineer position at Expel. With over five years of experience in security operations and a deep proficiency in Python, I have dedicated my career to bridging the gap between complex threat detection and efficient analyst workflows. My background includes developing custom detection logic across Windows, macOS, and Linux environments, as well as automating investigative processes to reduce mean time to respond (MTTR).
What excites me most about Expel is your commitment to "arming analysts with the tools they need to become superheroes." In my previous roles, I have seen firsthand how critical context and automated enrichment are for SOC efficiency. I am particularly impressed by Expel's transparent culture and your innovative approach to handling the combinatorial explosion of security signals. I am confident that my technical expertise in EDR/SIEM technologies and my passion for mentor-driven engineering will allow me to contribute significantly to the D&R Engineering team.
Составьте идеальное письмо к вакансии с ИИ-агентом

Откликнитесь в expel уже сейчас
Присоединяйтесь к Expel, чтобы создавать будущее автоматизированного реагирования на угрозы и защищать ведущие мировые компании.
Описание вакансии
Imagine yourself as a SOC analyst and a new alert shoots to the top of the queue. You open the alert and all of the relevant facts are laid out for you. You know the whos the whats and the wheres of what happened and it’s all right there in the alert. You notice the attacker IP immediately you wonder “Where is that IP located?”. Wonder no more because the IP has already been fully enriched with all publicly available information! This looks bad, just as you’re about to shift to the EDR console to see what kind of damage was done, you notice further down that’s already been provided for you. You have full context of everything that happened before, during and after this event and it’s confirming your suspicions. You raise the alarm and notify the customer that you’re digging into a potential security incident and it only took 20 seconds to make that decision.
Now imagine you are the one who created that alert. You understand security operations and have a keen understanding of what information is needed to make an informed decision about a potential attack. You know the sort of enrichment needed to provide the right context about the facts of the alert. You have studied the metrics from previous investigations and know where analysts get tripped up or slowed down on decisions during the moments that matter. You streamline the response process through automation and make sure the decisions can be made quickly. Now imagine that the SOC analyst never even needed to triage the alert because of your automations, it was automatically promoted to an incident for the SOC.
You also enjoy working together on a team to prioritize the problems that matter and work toward a solution. And you have a high degree of empathy and understand the demands of working in a SOC environment. You understand that scaling operations doesn’t always mean scaling with more people, the real strength comes when you can arm analysts with the tools they need to become super heroes.
Does this sound like you? At Expel, we’re taking a new approach to managed security. We spend our time trying to discover ways to keep our customers safe and our security analysts happy. We’re trying to meet our customers where they are—understanding a vast number of attacker tactics, security vendor capabilities, and customer requirements. We believe innovating while handling the combinatorial explosion represents a captivating problem. If you agree, we may have the job for you!
What Expel can do for you
- Place you into the middle of a fast-growing cybersecurity company with the most enthusiastic customers you’ve ever seen—a welcome surprise in the MSSP/MDR market
- Give you an opportunity to collaboratively drive a significant security capability of the business
- Enable you to learn from analysts, data scientists, engineers, and responders responsible for various components of Expel’s service and technology
- Facilitate ways to harness event signal from cloud service providers
- Provide an entertaining small and highly transparent startup environment
- Challenge you to push the boundaries of our security vision
- Provide access to popular EDR, network, and SIEM technologies
What you can do for Expel
- Architect, maintain and iteratively improve Expel's ability to detect and investigate threats using integrated technologies with limited direction
- Continuously improve Expel’s detection strategy and capability through creation of detections for Expel’s proprietary rule engine.
- Maintain documentation in support of Expel’s detection and response content
- Improve SOC analyst efficiency by automating investigative workflows using an orchestration framework written in Python.
- Collaborate with engineering on Expel’s integrations and engineering standards associated with each class of integration.
- Evaluate technology APIs to design detection and response solutions to drive value and efficiency in Expel’s Workbench platform.
- Contribute to and thrive in a culture of experimentation, agile, quality and continuous improvement among the team.
- Take a leading role in the team’s research and monitoring of the latest threat landscape and subsequent detection and response automation development.
- Communicate effectively with stakeholders on support requests surfaced to the D&R engineering team.
- Mentor less experienced team members and SOC analysts.
- Bridge the Engineering to effectively identify new platform features and tools to better enable the growth of our detection and response capabilities.
What you should bring with you
- 3+ years of experience with detection and response tools, particularly EDR, NSM, and SIEM.
- 3+ years of experience writing, deploying and tuning custom detections based on research or investigative work against common data sets (Windows Event Logs, auditd, CloudTrail, and similar datasets.)
- Proficiency of Python, Go or other object oriented programming languages
- Strong understanding of Windows, macOS and Linux operating systems and command line tools.
- Knowledge of networking basics, such as TCP/IP and OSI model.
- Expert knowledge and observations of attack vectors, threat tactics, and attacker techniques.
- Intermediate knowledge of cloud infrastructure platforms and their Identity and Access Management (IAM) models.
- Cursory understanding of common Software-as-a-Service (SaaS) applications and available security signal
- Bachelor’s degree in Computer Science or Information Security strongly preferred.
- 5+ years of professional experience in information technology or security operations would be ideal but not required.
Additional Notes
Pay range: $142,900 USD to $207,200 USD + bonus eligibility and equity.
We believe in paying transparently and equitably. Your salary will ultimately be based on factors such as your experience, skills, team equity, and market data. You’ll also be eligible for unlimited PTO (which we model and encourage), work location flexibility, up to 24 weeks of parental leave, and really excellent health benefits.
We’re only hiring those authorized to work in the United States. We do not currently sponsor immigration visas.
We’re an Equal Opportunity Employer: You’ll receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.
We’ll ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please let us know if you need accommodation of any kind.
#LI-Remote
Salary Range
$142,900—$207,200 USD
Создайте идеальное резюме с помощью ИИ-агента

Навыки
- Python
- Go
- EDR
- SIEM
- NSM
- Windows Event Logs
- CloudTrail
- TCP/IP
- IAM
- Linux
- macOS
- Windows
Возможные вопросы на собеседовании
Проверка практического опыта в создании логики обнаружения угроз.
Расскажите о самом сложном правиле детектирования, которое вы разработали: какую проблему оно решало и как вы минимизировали количество ложноположительных срабатываний?
Оценка навыков автоматизации и понимания рабочих процессов SOC.
Какие этапы процесса расследования инцидентов вы считаете наиболее подходящими для автоматизации и почему?
Проверка знаний в области облачной безопасности, упомянутых в вакансии.
Как бы вы подошли к мониторингу и обнаружению аномалий в моделях IAM (Identity and Access Management) в среде AWS или Azure?
Оценка способности работать с различными источниками данных.
С какими трудностями вы сталкивались при корреляции данных из разных источников, например, логов EDR и сетевого трафика?
Проверка навыков наставничества и командной работы.
Опишите случай, когда вам нужно было объяснить сложную техническую концепцию или новую систему обнаружения аналитикам SOC. Как вы убедились, что они смогут эффективно использовать этот инструмент?
Похожие вакансии
Senior Android Security / Reverse Engineer (HTTPS Traffic, Google Services)
Старший эксперт SIEM
Старший инженер внедрения SIEM
Pentester (Offensive Security)
Специалист по информационной безопасности
Application security specialist
1000+ офферов получено
Устали искать работу? Мы найдём её за вас
Quick Offer улучшит ваше резюме, подберёт лучшие вакансии и откликнется за вас. Результат — в 3 раза больше приглашений на собеседования и никакой рутины!
- Страна
- США
- Зарплата
- 142 900 $ – 207 200 $