- Страна
- Австралия
Откликайтесь
на вакансии с ИИ

Staff Security & Compliance Engineer
Отличная вакансия в быстрорастущей технологичной компании с культурой remote-first. Высокий уровень ответственности, работа с современным стеком (Panther, Wiz) и возможность влиять на продукт.
Сложность вакансии
Роль уровня Staff требует глубоких экспертных знаний в Detection Engineering, Incident Response и автоматизации (Python/NodeJS). Высокая ответственность за архитектуру безопасности и лидерство в инцидентах делает позицию сложной.
Анализ зарплаты
Зарплата для позиции Staff Security Engineer в Австралии обычно находится в верхнем сегменте рынка. Учитывая удаленный формат и уровень компании, предложение должно быть конкурентоспособным по сравнению с локальными технологическими гигантами.
Сопроводительное письмо
I am writing to express my strong interest in the Staff Security & Compliance Engineer position at Cribl. With extensive experience in security operations and a deep passion for detection engineering, I am drawn to Cribl’s innovative approach to data and its commitment to a remote-first culture. My background in designing high-fidelity detection rules and leading incident response aligns perfectly with your mission to strengthen security posture through advanced threat detection.
Throughout my career, I have specialized in leveraging frameworks like MITRE ATT&CK to develop proactive security measures and have a proven track record of optimizing SIEM platforms and cloud security tools. I am particularly excited about the opportunity to champion the use of Cribl’s own products within the security tech stack. I am confident that my technical expertise in Python and cloud-native security, combined with my collaborative mindset, will allow me to make significant contributions to the Cribl herd.
Составьте идеальное письмо к вакансии с ИИ-агентом

Откликнитесь в cribl уже сейчас
Присоединяйтесь к команде Cribl и станьте ключевым экспертом по безопасности в инновационной remote-first компании!
Описание вакансии
Cribl does differently.
What does that mean? It means we are a serious company that doesn’t take itself too seriously; and we’re looking for people who love to get stuff done, and laugh a bit along the way. We’re growing rapidly - looking for collaborative, curious, and motivated team members who are passionate about putting customers first. As a remote-first company we believe in empowering our employees to do their best work, wherever they are.
As the data engine for IT and Security many of the biggest names in the most demanding industries trust Cribl to solve their most pressing data needs. Ready to do the best work of your career? Join the herd and unlock your opportunity.
Why You’ll Love This Role
The Staff Security and Compliance Engineer will be a pivotal member of Cribl’s Information Security team, primarily responsible for strengthening our security posture through robust security operations and advanced threat detection. You will help lead security incident management, triage, and investigations, and be instrumental in developing innovative solutions to remediate current threats and proactively prevent future attacks. A key aspect of this role will be designing, implementing, and optimizing detection logic to identify sophisticated threats across our environment. You will partner closely with Product Security, IT, and Legal teams, and report to the Sr. Director, Security Engineering and Operations under the CISO.
As An Active Member Of Our Team, You Will…
- Monitor security events and alerting via our security tooling, including MSSP, SIEM, AI, and CSPM tooling, to identify and triage potential threats
- Design, develop, implement, and maintain high-fidelity detection rules and alerts within SIEM and other security platforms (e.g., EDR, Cloud Security tools) based on threat intelligence, MITRE ATT&CK framework, and identified risks
- Own the continuous tuning and optimization of existing detection logic to reduce false positives and improve detection efficacy
- Respond to issues identified by our Cribl employees
- Act as a security incident response lead, including leveraging and improving detection capabilities during investigations
- Design, build, and manage security playbooks, incorporating detection engineering best practices
- Conduct security assessments of corporate assets through vulnerability testing, threat hunts, and purple team activities, with a focus on identifying detection gaps and opportunities
- Perform both internal and external security reviews of corporate properties e.g., the corporate website and enterprise applications
- Lead security incident response tabletop exercises
- Continue to evolve and champion the use of Cribl products in our security tech stack to enhance detection, analysis, and response capabilities
- Collaborate with threat intelligence teams to integrate new indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) into detection strategies
- Partner cross-functionally with Product Security, IT, and Legal teams to strengthen overall security posture
- This position will require stand-by, on-call, or off-hours duties
If You’ve Got It - We Want It
- Provide knowledge and experience in working with modern security principles e.g. SIEM, security data lakes, detections as code, EDR, zero trust networking, and other security tooling, as well as demonstrated experience with incident response and management
- Utilize a strong understanding of common attack frameworks (e.g., MITRE ATT&CK) and how to map detections to TTPs
- Understanding of authentication and authorization schemes such as SAML, OpenID, OAuth2, and SCIM
- Experience scripting/coding in at least one of the following languages: Python, NodeJS, Ruby, Bash
- Proven ability to act as a technical subject matter expert on security, compliance, and assurance topics
- Communicate ideas to technical and non-technical audiences
- Comfortable with ambiguity, have a strong analytical acumen, self-motivated, able to work cross-functionally
- We are a remote-first company and work happens across many time-zones – you may be required to occasionally perform duties outside your standard working hours
- Experience with SIEM platforms like Panther is a plus and its detection capabilities
- Familiarity with Wiz and cloud native security tooling for detection in AWS, Azure, or GCP
- Relevant certifications in cloud security or incident response (e.g., SANS GIAC certifications)
- Proven experience in developing, deploying, and maintaining detection rules (e.g., Sigma, YARA, Splunk SPL, KQL) across various security platforms
#LI-GV1
#LI-Remote
Bring Your Whole Self
Diversity drives innovation, enables better decisions to support our customers, and inspires change for the better. We’re building a culture where differences are valued and welcomed, and we work together to bring out the best in each other. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which the candidate is applying.
Interested in joining the Cribl herd? Learn more about the smartest, funniest, most passionate goats you’ll ever meet at cribl.io/about-us.
Создайте идеальное резюме с помощью ИИ-агента

Навыки
- AWS
- Azure
- Python
- SAML
- GCP
- Bash
- Ruby
- Incident Response
- Cloud Security
- OAuth2
- Node.js
- SIEM
- MITRE ATT&CK
- Threat Hunting
- EDR
- Detection Engineering
- Vulnerability Testing
Возможные вопросы на собеседовании
Проверка практического опыта в создании правил обнаружения угроз.
Расскажите о вашем процессе разработки и тестирования правил обнаружения (Detection as Code). Как вы минимизируете количество ложноположительных срабатываний?
Оценка навыков лидерства в критических ситуациях.
Опишите наиболее сложный инцидент информационной безопасности, которым вы руководили. Какие шаги были предприняты для локализации и последующего предотвращения?
Проверка понимания современных векторов атак.
Как вы используете фреймворк MITRE ATT&CK для выявления пробелов в текущем мониторинге безопасности компании?
Оценка технических навыков в облачной среде.
Какие специфические риски безопасности вы видите в мультиоблачных средах (AWS/Azure/GCP) и как бы вы настроили мониторинг для их выявления?
Проверка умения работать с продуктом компании.
Как, по вашему мнению, инструменты Cribl могут улучшить пайплайн обработки данных безопасности по сравнению с традиционными SIEM-решениями?
Похожие вакансии
Senior Information Security (ИБ)
Senior Android Security / Reverse Engineer (HTTPS Traffic, Google Services)
Исследователь безопасности Android
Эксперт по защите периметра (WAF)
DevOps-инженер/ИБ (devops engineer, information security)
Сеньор AppSecOps-инженер
1000+ офферов получено
Устали искать работу? Мы найдём её за вас
Quick Offer улучшит ваше резюме, подберёт лучшие вакансии и откликнется за вас. Результат — в 3 раза больше приглашений на собеседования и никакой рутины!
- Страна
- Австралия