Expoint – all jobs in one place
The point where experts and best companies meet
Limitless High-tech career opportunities - Expoint

Amazon Security Engineer Customer Service Response Operations CSSRO 
United States, Texas, Dallas 
383863701

Yesterday
DESCRIPTION

Key job responsibilities
- Serve as a Subject Matter Expert (SME) on the incident response & technical investigation lifecycle, owning the deep dive and coordination to turn data into information.
- Respond to Incidents in a timely manner, providing leadership & guidance to all security analysts.
- Conduct deep-dive investigations into threat and fraud abuse reports and detections- Attend internal and external training regarding security engineering and response.
- Find opportunities to improve from large-scale security incident investigations.
- Participate in or lead post-mortem analyses.- Develop and mentor other security engineers, analysts, investigators, and software developers.About the team
Diverse Experiences
Amazon Security values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying.
Work/Life Balance

BASIC QUALIFICATIONS

- 1+ years of professional (non-internship) experience in related technical security roles such as threat hunting, threat intelligence, security data analysis, security operations, incident response, etc
- 1+ years of experience with cloud technologies (AWS preferred, Azure, Google Cloud, etc)
- 1+ years of experience in writing / reviewing code using data analysis tools and technologies, such as SQL, Jupyter, R, Python, etc
- 1+ years of experience with incident handling/response, active attacks / live scenarios / applied computer security


PREFERRED QUALIFICATIONS

- Bachelor's degree in mathematics, computer science, or related engineering disciplines
- GIAC Certified (GSEC, GCIH)
- Experience with host and network log analysis
- Knowledge and experience with hunting utilizing TTPs (Tactics, Techniques and Procedures)
- Knowledge of Windows, Linux, MacOS and/or ChromiumOS process and system monitoring
- Possess a strong understanding of common enterprise technologies
- Related Information Security Certifications