Назад
Company hidden
2 часа назад

Staff Security Platform Engineer (Cybersecurity)

171 000 - 247 000$
Формат работы
hybrid
Тип работы
fulltime
Грейд
senior
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Staff Security Platform Engineer (Cybersecurity): Managing and optimizing the enterprise security platform stack for autonomous trucking operations with an accent on detection rules, tool tuning, and high-fidelity signal. Focus on proactive threat hunting, operational health of EDR/SIEM/IAM tools, and solving complex security platform misconfigurations.

Location: Hybrid in Pittsburgh, Pennsylvania (in office at least 3 days per week)

Salary: $171,000 – $247,000 per Year

Company

hirify.global is developing self-driving technology for mobility and logistics to create a safer and more efficient transportation ecosystem.

What you will do

  • Own the operational health and continuous improvement of the security stack, including EDR/XDR, MDM, SIEM, DLP, IAM/IGA, DNS, Email security, and PKI.
  • Develop and refine detection rules, correlation logic, and alert policies to reduce noise and ensure high-fidelity coverage.
  • Conduct proactive threat hunting by forming hypotheses, querying logs, and investigating anomalies.
  • Act as the primary internal expert and escalation point for complex platform issues and detection failures.
  • Lead deep-dive investigations into security alerts and incidents, driving triage, containment, and root cause analysis.
  • Audit and validate security controls to ensure they are correctly configured and covering the required scope.

Requirements

  • 12+ years of hands-on experience in enterprise security operations, platform administration, or senior SOC engineering.
  • Expert-level proficiency administering at least two enterprise security platforms (e.g., CrowdStrike, Splunk, Okta, Wiz).
  • Proven ability to tune security platforms beyond default configurations and write custom detection logic.
  • Strong log analysis and threat hunting skills.
  • Experience conducting thorough incident investigations and communicating findings to stakeholders.
  • Must be based in or able to work hybrid in Pittsburgh, Pennsylvania.

Nice to have

  • Scripting ability in Python or Bash for automation and log parsing.
  • Deep familiarity with MITRE ATT&CK for detection gap analysis.
  • Experience with AWS security telemetry (CloudTrail, GuardDuty, Security Hub).
  • Familiarity with Zero Trust and identity-centric security models.
  • Platform-specific or practitioner certifications (e.g., CrowdStrike Falcon Administrator, Splunk Power User, GCIH, GCIA).

Culture & Benefits

  • Hybrid work environment prioritizing collaboration and empathy.
  • Competitive base salary, annual bonus, and equity compensation.
  • Culture focused on integrity, high goals, and a "no jerks" policy.
  • Deep commitment to safety and inclusion in the workplace.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →