What you’ll do:- Contribute to building and improving a scalable incident response program that embraces technology to effectively detect, analyze, and mitigate security incidents.
- Investigate and resolve complex security incidents through technical analysis, root cause identification, and actionable remediation plans.
- Streamline incident response and threat detection workflows by driving automation, orchestration, and scalable processes.
- Advance threat detection capabilities by developing threat models, identifying gaps, and implementing modern detection techniques.
- Research and analyze emerging attack techniques targeting Redis software, services and related technologies, collaborating with the security research community.
- Evaluate and integrate leading-edge technologies to enhance detection, response, and defense capabilities.
- Improve incident response playbooks and plans across a federated security model through collaborative review, training exercises, and cross-functional engagement.
- Foster collaboration and a culture of shared responsibility by partnering across teams to align security efforts and strengthen defenses.
What you will need:- Strong experience in security operations, preferably in a technical incident response role for a software or SaaS organization.
- Expertise working with security tooling (e.g. SIEM, EDR, CSPM/CDR) to analyze events and develop detection capabilities.
- Fluency in and ability to apply common models and frameworks for threat intelligence, detection development, and incident response (e.g. MITRE ATT&CK, Lockheed Martin Cyber Kill Chain).
- Familiarity with AWS, GCP, and Azure cloud environments, including their security features and best practices.
- Excellent verbal and written communication skills, with the ability to effectively communicate with audiences ranging from engineers to executive leadership.
- Demonstrated experience driving projects from start to finish, with the ability to both influence strategy and deliver tactical results.
- A proven ability to research, analyze, and adapt to emerging threats while continuously improving security processes and technologies.
Extra great if you have:- Proficiency in scripting or coding to automate threat intelligence, detection development, and incident response tasks.
- Experience actively participating in red teaming or purple teaming exercises to identify and remediate security gaps.
- Background in developing custom security tools to address unique detection, response, or analysis challenges.
- Experience presenting at security conferences, publishing research, or contributing to open-source security projects.
- Strong understanding of advanced adversarial tactics and techniques, and the ability to simulate them for defense testing and validation.
Our culture is what makes Redis a fun and rewarding place to work. To support you at work and beyond, we offer all our US team members fantastic benefits and perks:
- Competitive salaries and equity grants
- Unlimited time off to promote a healthy work-life balance
- H/D/V coverage along with 401K, FSA, and commuter benefits
- Frequent team celebrations and recreation events
- Home internet & phone stipend
- Learning and development opportunities
- Ability to influence a high-performance company on its way to IPO
The estimated gross base annual salary range for this role is $143,005–$171,606