Summary
Meta’s Infrastructure Security Monitoring (ISM) team is seeking an experienced engineer to help secure the infrastructure that connects over a billion users. You will be responsible for building, implementing and operationally supporting detections throughout our infrastructure. We are looking for candidates who are passionate about security and innovation, and eager to create solutions that strengthen our infrastructure and safeguard our community.
Responsibilities
1. Iterate security posture to better protect against attacks and detect new vectors
2. Lead efforts to mitigate and investigate security incidents
3. Utilize frameworks to develop and scale detection, mitigation and response automation tooling
4. Evaluate and test new vendor and home‑grown initiatives for security issues
5. Mentor and evangelize security practices through cross functional work with engineering teams throughout Meta
6. Keep Meta safe through active operation and defense of critical infrastructure
Minimum Qualifications
1. 3+ years of development experience in at least one programming language (Python, Go, etc.) with the ability to apply that to security tool development, automation, and overall programmatic solutions that will be used to defend infrastructure
2. 1+ years of experience in offensive/defensive security or systems engineering
3. Knowledge of network protocols (TCP/IP, computer networking, routing and switching) and Unix based systems
4. Experience researching, building, and implementing defensive security systems that are used against internal and external attack vectors
5. Experience designing and building out application, system and network security monitoring to aid in detection or forensic investigations
Preferred Qualifications
1. Background in intrusion detection, security investigations, and incident response
2. Understanding of MITRE ATT&CK Framework and associated threat actor techniques
3. Experience “threat hunting”, i.e. using threat intel to proactively and iteratively investigate these potential risks and finding suspicious behavior
4. Experience developing baselines and investigating anomalies in order to identify suspicious behavior
5. Experience with developing automation and utilizing frameworks to scale detection, mitigation or response tools
Industry: Internet
#J-18808-Ljbffr