Logo of Huzzle

Security Engineer - Detect & Respond (University Grad)

image

Meta

Feb 12

Applications are closed

  • Internship
    Full-time
    Off-cycle Internship
  • Software Engineering
  • San Francisco, +3

Requirements

  • Currently has, or is in the process, of obtaining a Bachelor's degree or equivalent experience in Security
  • Experience designing systems used for responding to external and/or insider threats
  • Experience analyzing network and host-based security events
  • Knowledge of networking technologies, specifically TCP/IP and the related protocols
  • Knowledge of operating systems, file systems, and memory structures on Windows, MacOS and Linux
  • Coding/scripting experience in one or more general purpose languages
  • Experience with attacker tactics, techniques, and procedures
  • Must obtain work authorization in country of employment at the time of hire, and maintain ongoing work authorization during employment
  • Preferred Qualifications:
  • Experience in Detection & Response Engineering or similar Security Engineering role
  • Experience building automations and integrations using SOAR platforms
  • Background in security-focused software engineering, designing large scale systems and data pipelines, or offensive security
  • Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
  • Experience with anomaly detection applicable to the insider threat detection space
  • Familiarity with campaign tracking techniques and skills to convert the tracking results to long term countermeasures
  • Familiarity with threat modeling framework, such as Diamond Model and/or MITRE ATT&CK framework
  • Experience with intelligence-driven threat hunting to spot suspicious activities and identify potential risks, and experience with building notebooks to automate such hunts
  • Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Offensive Security Testing, Detection and/or Response tooling development

Responsibilities

  • Work in cross-functional projects to improve our capabilities to effectively detect and respond to security incidents
  • Review security architecture of large-scale custom and commercial systems and independently propose logging, detection and prevention controls
  • Perform TTP-based Threat Modeling for a wide variety of assets including endpoints, mobile, servers, internal services, public & private cloud environments and networking equipment
  • Perform analysis against logs from a variety of sources (e.g., individual host logs, network traffic logs) to identify potential threats and detection ideas
  • Build response workflows and actions that auto-resolve false positives and provide context scaling our ability to investigate
  • Support security incident response in a cross-functional environment and drive incident resolution for internal and external threats
  • Design and implement attack testing automation to validate detection coverage
  • Build logging pipelines using our custom datasets and infrastructure
  • Track threat clusters posing threats to Meta’s infrastructure and employees
  • Improve the tooling of threat cluster tracking and intelligence data integration to existing systems and various intelligence feeds

Technology
Industry
10,001+
Employees
2004
Founded Year

Mission & Purpose

Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology.