Security Software Engineer, Incident Detection & Response (Senior)

at  CharacterAI

Menlo Park, California, USA -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate07 Jul, 2024Not Specified08 Apr, 20245 year(s) or aboveIncident Response,Aws,Macos,Platforms,Application Architecture,Splunk,Security OperationsNoNo
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

ABOUT US

Character’s mission is to empower everyone with AGI. Our vision is to enable people with our technology so that they can use Character.AI any moment of any day.
Character.AI is one of the world’s leading personal AI platforms. Founded in 2021 by AI pioneers Noam Shazeer and Daniel De Freitas, Character.AI is a full-stack AI company with a globally scaled direct-to-consumer platform. As of 2023 that platform was #2 in the space in user engagement. Character.AI is uniquely centered around people, letting users personalize their experience by interacting with AI “Characters.” The company achieved unicorn status in 2023 and was named Google Play’s AI App of the Year.
Noam co-invented the key tech powering LLMs and was recently named to TIME100’s Most Influential People in AI list. TIME called him “one of the most important and impactful people of the space’s past, present, and future.” Daniel created and led LaMDA, the breakthrough conversational tech project currently powering Bard.
To learn more, please visit beta.character.ai.

REQUIREMENTS:

Competitive candidates will have:

  • At least 5 years of experience in security incident detection and response and SecOps
  • Experience deploying and configuring SIEM systems such as Splunk, Sumo Logic, or Chronicle
  • Experience defining incident response playbooks and automating them using SOAR platforms such as XSOAR or Chronicle
  • An established history of driving incident response and security operations efforts
  • Knowledge of zero trust principles, including device posture assertion infrastructure
  • Familiarity with Linux and macOS environments, including demonstrable comfort with the Linux CLI
  • Experience working within cloud environments such as GCP or AWS
  • An ability to code at an intermediate level sufficient to build integrations between platforms and tools
  • A demonstrated ability to work autonomously to identify and resolve problems independently

Outstanding candidates will have one or more of the following:

  • Familiarity with CrowdStrike Falcon
  • Familiarity with web service or web application architecture and frameworks
  • Experience working with macOS mobile device management systems
  • Previous experience in a technology startup

Character is an equal opportunity employer and does not discriminate on the basis of race, religion, national origin, gender, sexual orientation, age, veteran status, disability or any other legally protected status. We value diversity and encourage applicants from a range of backgrounds to apply

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities:

RESPONSIBILITIES:

As a founding member of our Security Incident Detection and Response team, you will be responsible for driving the development of our security incident detection and response program. Hold sophisticated attackers at bay by envisioning, deploying, and managing the technology we rely on to detect attacks on our infrastructure, applications, and large language models. Design workflows and processes to rapidly and effectively respond to security incidents, and then automate them to support the growth and scaling of our fast-growing organization.

Job responsibilities may include:

  • Deploying and configuring SIEM and SOAR systems
  • Centralizing log ingestion pipelines and processing
  • Constructing high-signal dashboards to support critical security decision making
  • Integrating SIEM systems with alerting and escalation pipelines
  • Automating the correlation of suspicious events to potential security incidents
  • Defining, implementing, and automating incident response and security operations playbooks via SOAR platforms


REQUIREMENT SUMMARY

Min:5.0Max:10.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Proficient

1

Menlo Park, CA, USA