Senior Security Engineer, Threat Response

job
  • Klaviyo
Job Summary
Location
San Francisco ,CA 94199
Job Type
Contract
Visa
Any Valid Visa
Salary
PayRate
Qualification
BCA
Experience
2Years - 10Years
Posted
16 Mar 2025
Share
Job Description

Klaviyo is looking for a Senior Security Engineer to add to our growing Detection & Response Team. This is a hands-on role that involves responding to cyber threats and incidents, performing digital forensics and investigations, and automating threat response workflows. As a member of the team, you will have the opportunity to work on complex large-scale security challenges and collaborate with engineers across the enterprise to improve security posture of Klaviyo’s Corporate, Cloud and Product environments.

What you’ll be doing:

  • Respond to alerts, cyber threats, and incidents
  • Lead end-to-end incident response investigations
  • Serve as the incident commander during security incidents
  • Perform host and network based log analysis in a cloud first environment
  • Develop and codify threat response processes and workflows
  • Perform digital forensic investigations to include collection and analysis of evidence
  • Build security tools to automate threat response tasks
  • Develop detailed post incident and investigation reports
  • Solution complex challenges and work on projects centered around security operations
  • Collaborate with detection engineers to build and tune detections
  • Conduct threat hunts across corporate, cloud and product environments
  • Work with engineering stakeholders to improve security posture post investigations
  • Coach and mentor junior team members within the detection & response team

We’d love to hear from you if you have:

  • 6+ years of hands-on security operations experience in the modern cloud environments
  • Experience in triaging and responding to cyber threats, alerts, and incidents
  • Experience leading security incidents as primary responder or incident commander
  • Experience in log analysis, incident response and/or digital forensics
  • Experience with SIEM and centralized data lake logging (e.g., Splunk, Snowflake)
  • Experience with automating SecOps workflows
  • Experience securing cloud environments such as AWS, GCP, and/or Azure
  • Proficient in programming languages to automate/build features (e.g., Python, Go)
  • Understand techniques, tools and procedures used by threat actors
  • Strong fundamentals of linux and macOS
  • Automation-first approach for all work performed
  • Strong oral and written communication skills
  • Team player with a strong self-managing work ethic
#J-18808-Ljbffr
Other Smiliar Jobs