👉 Hiring remotely?
|Remote Health by SafetyWing|
Global health insurance for freelancers & remote workers
|Remote Health by SafetyWing|
Global health insurance for freelancers & remote workers
Cyber Detection Cryptography Threat Engineers Managersclosed
Cyber Detection Cryptography Threat Engineers Managers
This job post is closed and the position is probably filled. Please do not apply.
\nOpen roles include: \n\nJob level dependent on experience\n\nSecurity Optimization Engineer, Crypto Operations\n\nSenior Manager / Director, Crypto Operations\n\nDetection Engineer\n\nThreat Intel Engineer \n\nSalesforce is looking to add to our expanding security organization. We're seeking Security Operations Engineers who are passionate about security and have had hands-on operational experience with infrastructure at a cloud scale. The Security Operations team is responsible for helping ensure that Salesforce becomes the most secure and compliant enterprise cloud solution. Security Operations includes the Detection Cloud, CSIRT, Threat & Vulnerability Management and Threat Intelligence teams among others. This group manages a fast-paced and constantly growing environment that seeks to implement cutting-edge technology to secure the infrastructure behind one of the world's largest business driving technologies. As a member of one of these Security Operations teams, you understand modern cyber threats, how to detect them, how to efficiently respond to them, and an interest in growing as a cyber security professional.\n\nAll Positions Require:\n\n\n* \n\nA passion for Information Security\n\n\n* \n\nAttention to detail\n\n\n* \n\nExperience in Information Security, including security operations\n\n\n* \n\nSecurity incident response in coordination with other teams across the company and/or externally as required\n\n\n* \n\nMonitoring devices such as network and host-based intrusion detection systems, web application firewalls, database security monitoring systems, firewalls/routers/switches, proxy servers, antivirus systems, file integrity monitoring tools, and operating system logs.\n\n\n* \n\nUnderstanding of attack vectors and tools as well as the best practices for securing systems and networks\n\n\n* \n\nStrong technical understanding of network fundamentals and common Internet protocols\n\n\n* \n\nStrong understanding of the information security threat landscape (attack vectors and tools, best practices for securing systems and networks, etc.)\n\n\n* \n\nFamiliarity with Microsoft Windows, Mac OSX, and Linux/Unix system administration and security controls\n\n\n* \n\nFormulating and implementing monitoring, policies, procedures and standards relating to system security\n\n\n* \n\nSupport ongoing and new security/compliance initiatives\n\n\n* \n\nThe ability to build strong relationships with peers both internal and external to your functional group, and with peers/professional organizations outside your company\n\n\n* \n\nMust have strong verbal and written communication skills; ability to communicate effectively and clearly to both technical and non-technical staff.\n\n\n* \n\nSome travel may be required\n\n\n* \n\nJob level dependent on experience\n\n\n\n\n\nSecurity Optimization Engineer, Crypto Operations: \n\nAs a key member of our Crypto team, the Security Optimization Engineer will help build our growing cryptography operations team. The Security Optimization Engineer will need a passion for security, love hands-on work and a desire to innovate by driving efficiencies through process improvement and automation. You will be responsible for collaborating with our global operations team to identify, implement and optimize security services and operations. You’ll focus on strategic long term automation investments in order to help us scale our operations as the company continues to grow.\n\nResponsibilities:\n\n\n* \n\nEnhancing the security of our production systems, developing the tools to help us maintain and report on our security posture, ensuring that we maintain our external security certifications, and deploying and maintaining the security systems in our production data centers.\n\n\n* \n\nIdentify, design and deliver automation opportunities for cryptography services and operations.\n\n\n* \n\nProcess engineer existing workflows and identify optimization and automation opportunities.\n\n\n* \n\nDrive continuous improvement of processes, policies, procedures and technology.\n\n\n* \n\nSupport ongoing and new security/compliance initiatives.\n\n\n* \n\nEngineering and supporting security solutions in a large scale environment.\n\n\n* \n\nManagement/Review of systems security configurations.\n\n\n* \n\nSupport ongoing and new security/compliance initiatives.\n\n\n* \n\nSecurity incident response in coordination with other security teams across the company and/or externally as required.\n\n\n* \n\nDeploy and manage security systems.\n\n\n* \n\nDesign and development of tools to automate security or security reporting tasks.\n\n\n\n\n\nSenior Manager / Director, Crypto Operations\n\nSenior Manager / Director Crypto Operations to help build our growing cryptography operations team with a strong focus on certificate lifecycle management.\n\nRequired Skills/Experience\n\n\n* Deep understanding and ownership of Certificate Management. Individual will own certificate management for Salesforce\n\n* The ability to build & lead a high performing global team of engineers in the field of cryptography.Ownership of certificate management for Salesforce\n\n* Leading a team to ensure no expired certificates\n\n* Continuous improvements in certificate request efficiency through automation\n\n* 10+ years’ experience in the Information Security field, including operational security\n\n* 7+ Years experience in PKI/Cryptography\n\n* 5+ Years experience in Security operations\n\n* Identify, design and deliver automation opportunities for cryptography services and operations.\n\n* Deep understanding of running a RA (Registration Authority)\n\n* Experience working with leadership to influence risk decisions\n\n\n\n\nThe ability to build & lead a high performing global team of experts in the field of threat detection.\n\nDetection Cloud Engineers\n\nRequired Skills/Experience:\n\n\n* \n\nExperience analyzing security event data for anomalies. web application firewalls, database security monitoring systems, firewalls/routers/switches, proxy servers, antivirus systems, file integrity monitoring tools, and operating system logs\n\n\n* \n\nExperience managing intrusion detection systems (such as Suricata or Sourcefire)\n\n\n* \n\nExperience configuring security incident and event management tools (such as LogRhythm, Symantec SIM, LogLogic), including creating event filtering and correlation rules and reports.\n\n\n* \n\nAbility to write intrusion detection system rules\n\n\n\n\n\nDesired Skills/Experience:\n\n\n* \n\nStrong scripting skills (i.e. Python/Perl, shell scripting) a significant plus\n\n\n* \n\nExperience with Splunk or ElasticSearch\n\n\n* \n\nRelevant information security certifications OSCP, OSCE, SANS GCIA, SANS GCIH, SANS GPEN, SANS GFCA and CISSP\n\n\n\n\n\nThreat Intelligence Engineers\n\nRequired Skills/Experience:\n\n\n* \n\nStrong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis\n\n\n* \n\nStrong background in query development for SIEM/IDS\n\n\n* \n\nIn depth understanding of APT TTP’s\n\n\n* \n\nDemonstrated understanding of the life cycle of network threats, attacks, attack vectors, and methods of exploitation\n\n\n* \n\nDemonstrated hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, PCAP, Flow Log), and other artifacts in support of incident investigations.\n\n\n* \n\nExperience with malware analysis concepts and methodology\n\n\n* \n\nMotivated self-starter with strong written and verbal communications skills, and the ability to create complex technical reports on analytic findings\n\n\n\n\n\nDesired Skills/Experience:\n\n\n* \n\nStrong scripting skills (i.e. Python/Perl, shell scripting) a significant plus\n\n\n* \n\nExperience with Splunk or ElasticSearch\n\n\n\n\n\nAccessibility - If you require accessibility assistance applying for open positions please contact the Salesforce.com Recruiting Department.\n\nPosting Statement\n\nSalesforce.com and Salesforce.org are Equal Employment Opportunity and Affirmative Action Employers. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender perception or identity, national origin, age, marital status, protected veteran status, or disability status. Headhunters and recruitment agencies may not submit resumes/CVs through this Web site or directly to managers. Salesforce.com and Salesforce.org do not accept unsolicited headhunter and agency resumes. Salesforce.com and Salesforce.org will not pay fees to any third-party agency or company that does not have a signed agreement with Salesforce.com or Salesforce.org.\n\nPursuant to the San Francisco Fair Chance Ordinance and the Los Angeles Fair Chance Initiative for Hiring, Salesforce will consider for employment qualified applicants with arrest and conviction records.
See more jobs at Salesforce
# How do you apply?\n\n This job post is older than 30 days and the position is probably filled. Try applying to jobs posted recently instead.