Overview
Orrick currently has an excellent opportunity for a Senior IT Security Engineer, Threat Response. This position could be based in any of our U.S. offices and consideration given for 100% remote US locations.
Responsibilities
As a Threat Hunter, you will play a critical role in protecting Orrick by proactively identifying, investigating, and mitigating threats before they can cause harm. The Threat Hunter will work closely with our Security Operations Center (SOC), incident response teams, and other IT stakeholders to stay ahead of emerging threats and ensure the security of our digital assets.
Incident Response: Collaborate with the incident response team to investigate and respond to security incidents, providing expert analysis and support.
Proactive Threat Hunting: Conduct advanced threat hunting activities to detect unknown and sophisticated threats that have bypassed traditional security defenses.
Data Analysis: Analyze security alerts, network traffic, endpoint logs, and other data sources to identify anomalies and potential threats.
Threat Intelligence: Integrate threat intelligence data into response and hunting activities, ensuring that the organization is aware of and protected against emerging threats.
Tool Development: Develop and refine custom scripts, queries, tools, and automation to enhance threat detection and hunting capabilities.
Reporting: Document and report findings, including potential risks, vulnerabilities, and recommended remediation steps to key stakeholders.
Collaboration: Work with other cybersecurity teams to improve detection rules, refine security policies, and enhance overall security posture.
Continuous Improvement: Stay updated on the latest threat hunting techniques, tools, and best practices, and continuously improve the threat-hunting process.
Additional security operations duties as requested.
Qualifications
Technical Skills:
Strong conceptual understanding of how computers, operating systems, and networks interact in an enterprise setting.
Experience with security monitoring tools and security analysis tools.
Experience integrating cyber threat intelligence Into security operations.
Ability to clearly document an investigation plan and findings.
Knowledge of malware analysis, digital forensics, or reverse engineering is a plus.
Certifications such as GIAC Certified Forensic Analyst (GCFA) or similar considered an asset.
Proficiency in Jupyter Notebooks or a willingness to quickly learn and apply the tool is a plus.
Durable Skills:
Strong analytical and pragmatic problem-solving abilities.
Excellent business communication skills, both written and verbal.
Ability to work independently and as part of a team.
Consistent attention to detail.
Commitment to staying ahead of emerging threats.
Experience working in a Security Operations Center (SOC) environment.
Who is Orrick Orrick is a global law firm focused on delivering innovative solutions for four sectors: Technology & Innovation, Energy & Infrastructure, Finance and Life Sciences & HealthTech. Founded more than 150 years ago in San Francisco, Orrick today has offices in 25+ markets. We are recognized globally for delivering the highest-quality legal advice and for our culture of innovation and collaboration.
Compensation and Benefits
The expected salary range for this position is:
New York City, Silicon Valley, and San Francisco $150,000 - $201,600
Washington DC, Los Angeles, Orange County, Santa Monica, Sacramento, Boston, and Seattle $150,000 - $186,300
All Other US Locations $150,000 - $186,3000
Orrick is committed to providing a comprehensive,... For full info follow application link.
All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, national origin, protected veteran status, or on the basis of disability.